-
1
-
-
84860657417
-
-
Android Permission Protection Levels. http://developer.android.com/ reference/android/R.styleable.html#AndroidManifestPermission-protectionLevel.
-
Android Permission Protection Levels
-
-
-
4
-
-
84860691136
-
-
Dalvik. http://sites.google.com/site/io/dalvik-vm-internals/.
-
Dalvik
-
-
-
5
-
-
84860691138
-
-
April, 2011 and May
-
Distmo Report: April, 2011 and May, 2011. http://www.distimo.com/ publications.
-
(2001)
Distmo Report
-
-
-
7
-
-
84860764042
-
MockDroid: Trading privacy for application functionality on smartphones
-
May
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. MockDroid: Trading Privacy for Application Functionality on Smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile'11, May 2011.
-
(2011)
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile'11
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
8
-
-
85180738466
-
Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks
-
February
-
L. Bindschaedler, M. Jadliwala, I. Bilogrevic, I. Aad, P. Ginzboorg, V. Niemi, and J.-P. Hubaux. Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12
-
-
Bindschaedler, L.1
Jadliwala, M.2
Bilogrevic, I.3
Aad, I.4
Ginzboorg, P.5
Niemi, V.6
Hubaux, J.-P.7
-
9
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
February
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards Taming Privilege-Escalation Attacks on Android. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
10
-
-
80755127062
-
Practical and lightweight domain isolation on android
-
S. Bugiel, L. Davi, A. Dmitrienko, S. Heuser, A.-R. Sadeghi, and B. Shastry. Practical and Lightweight Domain Isolation on Android. In Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM'11, 2011.
-
(2011)
Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM'11
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Heuser, S.4
Sadeghi, A.-R.5
Shastry, B.6
-
11
-
-
85066347237
-
QUIRE: Lightweight provenance for smart phone operating systems
-
August
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
12
-
-
84888331381
-
PiOS: Detecting privacy leaks in ios applications
-
February
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11, February 2011.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
13
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
February
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI'10, pages 1-6, February 2010.
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.N.7
-
15
-
-
74049155830
-
On lightweight mobile phone application certification
-
October
-
W. Enck, M. Ongtang, and P. McDaniel. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS'09, pages 235-245, October 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS'09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
Mcdaniel, P.3
-
16
-
-
80755187788
-
Android permissions demysti
-
October, ed.
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demysti.ed. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11, October 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
17
-
-
80755187788
-
Android permissions demystified
-
October
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
18
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
August
-
A. P. Felt, H. Wang, A. Moschuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.2
Moschuk, A.3
Hanna, S.4
Chin, E.5
-
20
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
February
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS'12
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
22
-
-
78649253656
-
MobiAd: Private and scalable mobile advertising
-
September
-
H. Haddadi, P. Hui, and I. Brown. MobiAd: Private and Scalable Mobile Advertising. In Proceedings of the 5th ACM International Workshop on Mobility in the Evolving Internet Architecture, MobiArch'10, pages 33-38, September 2010.
-
(2010)
Proceedings of the 5th ACM International Workshop on Mobility in the Evolving Internet Architecture, MobiArch'10
, pp. 33-38
-
-
Haddadi, H.1
Hui, P.2
Brown, I.3
-
23
-
-
0024089972
-
The confused deputy, or why capabilities might have been invented
-
N. Hardy. The Confused Deputy, or Why Capabilities Might Have Been Invented. In ACM Operating Systems Review, volume 22, pages 36-38, 1988.
-
(1988)
ACM Operating Systems Review
, vol.22
, pp. 36-38
-
-
Hardy, N.1
-
24
-
-
80755187778
-
These aren't the droids you're looking for": Retrofitting android to protect data from imperious applications
-
October
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. "These Aren't the Droids You're Looking For": Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
26
-
-
84860652586
-
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
-
April
-
C. Marforio, F. Aurélien, and S. Č apkun. Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Technical Report 724, ETH Zurich, April 2011.
-
(2011)
Technical Report 724, ETH Zurich
-
-
Marforio, C.1
Aurélien, F.2
Apkun, S.Č.3
-
27
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
April
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 328-332, April 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
28
-
-
77950851532
-
Semantically rich application-centric security in android
-
December
-
M. Ongtang, S. E. McLaughlin, W. Enck, and P. D. McDaniel. Semantically Rich Application-Centric Security in Android. In Proceedings of the 25th Annual Computer Security Applications Conference, ACSAC'09, pages 340-349, December 2009.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference, ACSAC'09
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.E.2
Enck, W.3
McDaniel, P.D.4
-
31
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
February
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11, pages 17-33, February 2011.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
32
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
February
-
V. Toubiana, H. Nissenbaum, A. Narayanan, S. Barocas, and D. Boneh. Adnostic: Privacy Preserving Targeted Advertising. In Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS'10, February 2010.
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS'10
-
-
Toubiana, V.1
Nissenbaum, H.2
Narayanan, A.3
Barocas, S.4
Boneh, D.5
-
33
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
June
-
Y. Zhou, X. Zhang, X. Jiang, and V. Freeh. Taming Information-Stealing Smartphone Applications (on Android). In Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST'11, June 2011.
-
(2011)
Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST'11
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
|