-
1
-
-
84873821798
-
-
accessed March 30, 2012
-
Android developer reference, http://d.android.com/ (accessed March 30, 2012)
-
Android Developer Reference
-
-
-
2
-
-
78650959489
-
-
accessed March 30, 2012
-
Android security and permissions, http://d.android.com/guide/topics/ security/security.html (accessed March 30, 2012)
-
Android Security and Permissions
-
-
-
3
-
-
84863087188
-
-
Bitblaze, http://bitblaze.cs.berkeley.edu/
-
-
-
-
4
-
-
84863087187
-
-
accessed March 2011
-
Go Apk. Go apk market, http://market.goapk.com (accessed March 2011)
-
Go Apk Market
-
-
-
5
-
-
84874847073
-
-
accessed August 15, 2011
-
AppBrain. Number of available android applications, http://www.appbrain. com/stats/number-of-android-apps (accessed August 15, 2011)
-
Number of Available Android Applications
-
-
-
6
-
-
77957939810
-
-
accessed March 18, 2011
-
Bornstein, D.: Dalvik vm internals (2008), http://goo.gl/knN9n (accessed March 18, 2011)
-
(2008)
Dalvik Vm Internals
-
-
Bornstein, D.1
-
7
-
-
84863484969
-
-
IBM T.J. Watson Research Center. (wala) March accessed March 30, 2012
-
IBM T.J. Watson Research Center. T.j. watson libraries for analysis (wala) (March 2011) (accessed March 30, 2012)
-
(2011)
T.j. Watson Libraries for Analysis
-
-
-
8
-
-
82055190610
-
-
accessed March 17, 2011
-
The Nielsen Company. Who is winning the u.s. smartphone battle?, http://blog.nielsen.com/nielsenwire/online mobile/who-is-winning-the-u-s- smartphone-battle (accessed March 17, 2011)
-
Who Is Winning the U.s. Smartphone Battle?
-
-
-
9
-
-
79955565381
-
Pios: Detecting privacy leaks in ios applications
-
Egele, M., Kruegel, C., Kirda, E., Vigna, G.: Pios: Detecting privacy leaks in ios applications. In: Proceedings of the Network and Distributed System Security Symposium (2011)
-
Proceedings of the Network and Distributed System Security Symposium (2011)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
10
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1-6. USENIX Association (2010)
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
11
-
-
85025700509
-
A study of android application security
-
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proc. of the 20th USENIX Security Symposium (2011)
-
Proc. of the 20th USENIX Security Symposium (2011)
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
12
-
-
80755187788
-
Android permissions demystified
-
ACM
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627-638. ACM (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
14
-
-
84870428915
-
-
Google accessed March, 2011
-
Google. Google play , http://market.android.com (accessed March, 2011)
-
Google Play
-
-
-
15
-
-
84878002799
-
-
accessed March 30, 2012
-
Apple Inc. App store review guidelines, http://developer.apple.com/ appstore/guidelines.html (accessed March 30, 2012)
-
App Store Review Guidelines
-
-
-
19
-
-
70450242742
-
Taj: Effective taint analysis of web applications
-
ACM
-
Tripp, O., Pistoia, M., Fink, S.J., Sridharan, M., Weisman, O.: Taj: effective taint analysis of web applications. In: ACM Sigplan Notices, vol. 44, pp. 87-97. ACM (2009)
-
(2009)
ACM Sigplan Notices
, vol.44
, pp. 87-97
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
21
-
-
85037359376
-
Taming Information-Stealing Smartphone Applications (on Android)
-
McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. Springer, Heidelberg
-
Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming Information-Stealing Smartphone Applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6740
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|