-
1
-
-
79960344619
-
Runtime verification for LTL and TLTL
-
Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. (TOSEM) 20(4), 14 (2011)
-
(2011)
ACM Trans. Softw. Eng. Methodol. (TOSEM)
, vol.20
, Issue.4
, pp. 14
-
-
Bauer, A.1
Leucker, M.2
Schallhart, C.3
-
2
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
ACM
-
Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proc. 6th Int. Conf.Mobile Systems, Applications, and Services (MobiSys), pp. 225-238. ACM (2008)
-
(2008)
Proc. 6th Int. Conf.Mobile Systems, Applications, and Services (MobiSys)
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
3
-
-
24644483315
-
Java-MOP: A monitoring oriented programming environment for java
-
Tools and Algorithms for the Construction and Analysis of Systems - 11th Int. Conference, TACAS 2005, held as part of the Joint European Conf. on Theory and Practice of Software, ETAPS 2005, Proc.
-
Chen, F., Roşu, G.: Java-MOP: A Monitoring Oriented Programming Environment for Java. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 546-550. Springer, Heidelberg (2005) (Pubitemid 41282531)
-
(2005)
Lecture Notes in Computer Science
, vol.3440
, pp. 546-550
-
-
Chen, F.1
Rosu, G.2
-
4
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck,W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J.,McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proc. 9th USENIX Symp. on OS Design and Implementation (OSDI). USENIX (2010)
-
Proc. 9th USENIX Symp. on OS Design and Implementation (OSDI). USENIX (2010)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
5
-
-
80755187788
-
Android permissions demystified
-
ACM
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proc. 18th ACM Conf. Comp. and Comm. Security (CCS), pp. 627-638. ACM (2011)
-
(2011)
Proc. 18th ACM Conf. Comp. and Comm. Security (CCS)
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
6
-
-
80755172898
-
The effectiveness of application permissions
-
USENIX
-
Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proc. 2nd USENIX Conf. on Web Application Development, pp. 7-19. USENIX (2011)
-
(2011)
Proc. 2nd USENIX Conf. on Web Application Development
, pp. 7-19
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
7
-
-
33751504356
-
Runtime verification for autonomous spacecraft software
-
IEEE
-
Goldberg, A., Havelund, K., Mcgann, C.: Runtime verification for autonomous spacecraft software. In: IEEE 2005 Aerospace Conference (IEEEAC), pp. 507-516. IEEE (2005)
-
(2005)
IEEE 2005 Aerospace Conference (IEEEAC)
, pp. 507-516
-
-
Goldberg, A.1
Havelund, K.2
Mcgann, C.3
-
8
-
-
84859449045
-
-
Google Inc.
-
Google Inc., Android development site, http://developer.android.com/
-
-
-
-
9
-
-
84859459189
-
-
Google Inc.
-
Google Inc., http://developer.android.com/guide/topics/security/ security.html
-
-
-
-
10
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology 4(3), 251-266 (2008)
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
11
-
-
84859449047
-
First SMS Trojan for Android is in the wild
-
Web site, August
-
Leyden, J.: First SMS Trojan for Android is in the wild. Web site, The Register (August 2010)
-
(2010)
The Register
-
-
Leyden, J.1
-
12
-
-
77950851532
-
Semantically rich application-centric security in Android
-
IEEE
-
Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in Android. In: Proc. Annual Comp. Sec. Applications Conference (ACSAC), pp. 340-349. IEEE (2009)
-
(2009)
Proc. Annual Comp. Sec. Applications Conference (ACSAC)
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
|