-
1
-
-
84863929670
-
-
Press Release November
-
Gartner Group. Press Release (November 2011), http://www.gartner.com/it/ page.jsp?id=1848514
-
(2011)
-
-
-
2
-
-
85025700509
-
A study of android application security
-
USENIX Association, Berkeley
-
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 21. USENIX Association, Berkeley (2011)
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC 2011
, pp. 21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
4
-
-
80755187788
-
Android permissions demystified. Proceedings of the 18th
-
ACM
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 627-638 (2011)
-
(2011)
Conference on Computer and Communications Security, CCS 2011
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
5
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
ACM, New York
-
Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 328-332. ACM, New York (2010)
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
6
-
-
77950851532
-
Semantically rich application-centric security in android
-
Ongtang, M., Mclaughlin, S., Enck, W., Mcdaniel, P.: Semantically rich application-centric security in android. In: ACSAC 2009: Annual Computer Security Applications Conference (2009)
-
ACSAC 2009: Annual Computer Security Applications Conference (2009)
-
-
Ongtang, M.1
Mclaughlin, S.2
Enck, W.3
Mcdaniel, P.4
-
7
-
-
80755167433
-
-
Technical Report TR-2011-04, Technische Univ. Darmstadt April
-
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Univ. Darmstadt (April 2011)
-
(2011)
Xmandroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
8
-
-
85037073388
-
Privilege Escalation Attacks on Android
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
-
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege Escalation Attacks on Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346-360. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6531
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
9
-
-
79961035117
-
Analyzing inter-application communication in Android
-
ACM, New York
-
Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, pp. 239-252. ACM, New York (2011)
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
79251548972
-
Google android: A state-of-the-art review of security mechanisms
-
abs/0912.5101
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google android: A state-of-the-art review of security mechanisms. CoRR, abs/0912.5101 (2009)
-
(2009)
CoRR
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
-
11
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing 3(4), 11-15 (2004)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
12
-
-
79952266600
-
Detection of Malicious Applications on Android OS
-
Sako, H., Franke, K., Saitoh, S. (eds.) IWCF 2010. Springer, Heidelberg
-
Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of Malicious Applications on Android OS. In: Sako, H., Franke, K., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 138-149. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6540
, pp. 138-149
-
-
Di Cerbo, F.1
Girardello, A.2
Michahelles, F.3
Voronkova, S.4
-
13
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
Burguera, I., Zurutuza, U., Nadjm-Therani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011 (2011)
-
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011 (2011)
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Therani, S.3
-
14
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
June
-
Schmidt, A.-D., Bye, R., Schmidt, H.-G., Clausen, J., Kiraz, O., Yuksel, K.A., Camtepe, S.A., Albayrak, S.: Static analysis of executables for collaborative malware detection on android. In: IEEE International Conference on Communications, ICC 2009, pp. 1-5 (June 2009)
-
(2009)
IEEE International Conference on Communications, ICC 2009
, pp. 1-5
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.A.6
Camtepe, S.A.7
Albayrak, S.8
-
15
-
-
85037359376
-
Taming Information-Stealing Smart-phone Applications (on Android)
-
McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. Springer, Heidelberg
-
Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming Information-Stealing Smart-phone Applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6740
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|