-
1
-
-
80051969895
-
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
-
IEEE Computer Society, USA
-
Becher, M., Freiling, F., Hoffmann, J., Holz, T., Uellenbeck, S., Wolf, C.: Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In: Proc. of the 2011 IEEE Symposium on Security and Privacy (SP 2011), pp. 96-111. IEEE Computer Society, USA (2011)
-
(2011)
Proc. of the 2011 IEEE Symposium on Security and Privacy (SP 2011)
, pp. 96-111
-
-
Becher, M.1
Freiling, F.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
2
-
-
79955442931
-
Smart security
-
Caldwell, T.: Smart security. Network Security 2011(4), 5-9 (2011)
-
(2011)
Network Security
, vol.2011
, Issue.4
, pp. 5-9
-
-
Caldwell, T.1
-
3
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.: Quire: lightweight provenance for smart phone operating systems. In: 20th USENIX Security Symposium, USA (2011)
-
20th USENIX Security Symposium, USA (2011)
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.5
-
4
-
-
63049137706
-
Information security: The moving target
-
Dlamini, M., Eloff, J., Eloff, M.: Information security: The moving target. Computers & Security 28(3-4), 189-198 (2009)
-
(2009)
Computers & Security
, vol.28
, Issue.3-4
, pp. 189-198
-
-
Dlamini, M.1
Eloff, J.2
Eloff, M.3
-
5
-
-
85025700509
-
A study of android application security
-
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proc. of the 20th USENIX Conference on Security (SEC 2011), USA, p. 21 (2011)
-
(2011)
Proc. of the 20th USENIX Conference on Security (SEC 2011), USA
, pp. 21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
7
-
-
80755172898
-
The effectiveness of application permissions
-
Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: 2nd USENIX Conference on Web Application Development (WebApps 2011), pp. 75-86 (2011)
-
(2011)
2nd USENIX Conference on Web Application Development (WebApps 2011)
, pp. 75-86
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
9
-
-
85165758676
-
Systematic Detection of Capability Leaks in Stock Android Smartphones
-
Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic Detection of Capability Leaks in Stock Android Smartphones. In: Proc. of the 19th Network and Distributed System Security Symposium, NDSS 2012 (2012)
-
(2012)
Proc. of the 19th Network and Distributed System Security Symposium, NDSS 2012
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
11
-
-
70449482830
-
-
Recommendations of the National Institute of Standards and Technology, Special Publication 800-124
-
Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology, Special Publication 800-124 (2008)
-
(2008)
Guidelines on Cell Phone and PDA Security
-
-
Jansen, W.1
Scarfone, K.2
-
12
-
-
79960333886
-
A Practical Analysis of Smartphone Security
-
Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. Springer, Heidelberg
-
Jeon, W., Kim, J., Lee, Y., Won, D.: A Practical Analysis of Smartphone Security. In: Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. LNCS, vol. 6771, pp. 311-320. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6771
, pp. 311-320
-
-
Jeon, W.1
Kim, J.2
Lee, Y.3
Won, D.4
-
13
-
-
84863940460
-
-
Kaspersky Labs
-
Kaspersky Labs: IT Threat Evolution: Q3 (2011), http://www.securelist. com/en/analysis/204792201/IT-Threat-Evolution-Q3-2011
-
(2011)
IT Threat Evolution: Q3
-
-
-
14
-
-
80052818132
-
Risk Assessment for Mobile Devices
-
Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. Springer, Heidelberg
-
Ledermüller, T., Clarke, N.L.: Risk Assessment for Mobile Devices. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 210-221. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6863
, pp. 210-221
-
-
Ledermüller, T.1
Clarke, N.L.2
-
15
-
-
84863964653
-
-
MSc Thesis, Royal Holloway, University of London
-
Mylonas, A.: Smartphone spying tools. MSc Thesis, Royal Holloway, University of London (2008)
-
(2008)
Smartphone Spying Tools
-
-
Mylonas, A.1
-
16
-
-
80052493767
-
Smartphone Security Evaluation: The Malware Attack Case
-
Samarati, P., Lopez, J. (eds.) SciTePress
-
Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D.: Smartphone Security Evaluation: The Malware Attack Case. In: Samarati, P., Lopez, J. (eds.) International Conference on Security and Cryptography (SECRYPT 2011), pp. 25-36. SciTePress (2011)
-
(2011)
International Conference on Security and Cryptography (SECRYPT 2011)
, pp. 25-36
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
18
-
-
80052863388
-
Security and Privacy in an Online World
-
Oppliger, R.: Security and Privacy in an Online World. Computer 44(9), 21-22 (2011)
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 21-22
-
-
Oppliger, R.1
-
19
-
-
84969376625
-
-
OWASP: Top 10 Mobile Risks, http://www.owasp.org/index.php/WASP-Mobile- Security-Project
-
Top 10 Mobile Risks
-
-
-
21
-
-
77950675112
-
Google Android: A Comprehensive Security Assessment
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A Comprehensive Security Assessment. IEEE Security and Privacy 8(2), 35-44 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
|