메뉴 건너뛰기




Volumn , Issue , 2012, Pages 311-320

Is this app safe? A large scale study on application permissions and risk signals

Author keywords

Android apps; Application permissions; Chrome extensions; Facebook apps; Privacy

Indexed keywords

ANDROID APPS; CHROME EXTENSIONS; FACEBOOK; LARGE SCALE DATA; MOBILE APPLICATIONS; PRIVACY RISKS; RISK SIGNALS; THIRD PARTY APPLICATION (APPS);

EID: 84861302816     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2187836.2187879     Document Type: Conference Paper
Times cited : (147)

References (31)
  • 1
    • 77049099362 scopus 로고    scopus 로고
    • Imagined communities: Awareness, information sharing, and privacy on the facebook
    • G. Danezis and P. Golle, editors, volume 4258 of Lecture Notes in Computer Science, Springer
    • A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In G. Danezis and P. Golle, editors, Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, pages 36-58. Springer, 2006.
    • (2006) Privacy Enhancing Technologies , pp. 36-58
    • Acquisti, A.1    Gross, R.2
  • 3
  • 4
    • 84861308406 scopus 로고    scopus 로고
    • AppBrain. http://www.appbrain.com.
    • AppBrain
  • 5
    • 81855212018 scopus 로고    scopus 로고
    • Seeding a security-enhancing infrastructure for multi-market application ecosystems
    • April, TR-11-06
    • D. Barrera, W. Enck, and P. C. van Oorschot. Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report, Carleton University, April 2011. TR-11-06.
    • (2011) Technical Report, Carleton University
    • Barrera, D.1    Enck, W.2    Van Oorschot, P.C.3
  • 6
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android categories and subject descriptors
    • ACM
    • D. Barrera, P. C. van Oorschot, and A. Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android Categories and Subject Descriptors. In Proc. of the 17th ACM conf. on Computer and Communications Security, CCS'10, pages 73-84. ACM, 2010.
    • (2010) Proc. of the 17th ACM Conf. on Computer and Communications Security, CCS'10 , pp. 73-84
    • Barrera, D.1    Van Oorschot, P.C.2    Somayaji, A.3
  • 9
    • 84857065766 scopus 로고    scopus 로고
    • Re-evaluating the wisdom of crowds in assessing web security
    • G. Danezis, editor, volume 7035 of Lecture Notes in Computer Science, Springer
    • P. H. Chia and S. J. Knapskog. Re-evaluating the wisdom of crowds in assessing web security. In G. Danezis, editor, Financial Cryptography and Data Security, FC'11, volume 7035 of Lecture Notes in Computer Science, pages 299-314. Springer, 2012.
    • (2012) Financial Cryptography and Data Security, FC'11 , pp. 299-314
    • Chia, P.H.1    Knapskog, S.J.2
  • 10
    • 0024682488 scopus 로고
    • Computational aspects of computer viruses
    • F. Cohen. Computational aspects of computer viruses. Computers & Security, 8(4):297-298, 1989.
    • (1989) Computers & Security , vol.8 , Issue.4 , pp. 297-298
    • Cohen, F.1
  • 11
    • 84941869105 scopus 로고
    • A technique for computer detection and correction of spelling errors
    • March
    • F. J. Damerau. A technique for computer detection and correction of spelling errors. Communications of the ACM, 7:171-176, March 1964.
    • (1964) Communications of the ACM , vol.7 , pp. 171-176
    • Damerau, F.J.1
  • 14
    • 84861309873 scopus 로고    scopus 로고
    • May
    • Facebook partners with WOT. Article on ArcticStartup website, May 2011. http://www.arcticstartup.com/2011/05/12/facebook-partners-with-wot-to-protect- its-700-million-users.
    • (2011) Facebook Partners with WOT
  • 15
    • 84861309876 scopus 로고    scopus 로고
    • Personal Communication
    • A. P. Felt. Personal Communication.
    • Felt, A.P.1
  • 22
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10(8):707-710, 1966.
    • (1966) Soviet Physics Doklady , vol.10 , Issue.8 , pp. 707-710
    • Levenshtein, V.I.1
  • 24
    • 77955318018 scopus 로고    scopus 로고
    • Measuring the perpetrators and funders of typosquatting
    • R. Sion, editor, volume 6052 of Lecture Notes in Computer Science, Springer
    • T. Moore and B. Edelman. Measuring the perpetrators and funders of typosquatting. In R. Sion, editor, Financial Cryptography and Data Security, FC'10, volume 6052 of Lecture Notes in Computer Science, pages 175-191. Springer, 2010.
    • (2010) Financial Cryptography and Data Security, FC'10 , pp. 175-191
    • Moore, T.1    Edelman, B.2
  • 27
    • 84861309877 scopus 로고    scopus 로고
    • I'm allowing what?, Disclosing the authority applications demand of users as a condition of installation
    • MSR-TR-2010-54
    • J. Tam, R. W. Reeder, and S. Schechter. I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation. Technical report, Microsoft Research, 2010. MSR-TR-2010-54.
    • (2010) Technical Report, Microsoft Research
    • Tam, J.1    Reeder, R.W.2    Schechter, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.