-
1
-
-
80755127060
-
Short paper: A look at smartphone permission models
-
ACM
-
K. Au, Y. Zhou, Z. Huang, P. Gill, and D. Lie. Short paper: a look at smartphone permission models. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 63-68. ACM, 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 63-68
-
-
Au, K.1
Zhou, Y.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
2
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
ACM
-
D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security, pages 73-84. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.2
Van Oorschot, P.3
Somayaji, A.4
-
4
-
-
27944460531
-
Target detection in radar imagery using support vector machines with training size biasing
-
H. Chew, D. Crisp, R. Bogner, and C. Lim. Target detection in radar imagery using support vector machines with training size biasing. In Proc. Int. Conf. on Control, Automation, Robotics, and Vision (ICARCV), 2000.
-
(2000)
Proc. Int. Conf. on Control, Automation, Robotics, and Vision (ICARCV)
-
-
Chew, H.1
Crisp, D.2
Bogner, R.3
Lim, C.4
-
5
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1-6. USENIX Association, 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
6
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA USENIX Association
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21-21, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
7
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA ACM
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 235-245, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
9
-
-
80755187788
-
Android permissions demystified
-
ACM
-
A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627-638. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
11
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 627-638, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
12
-
-
80755181021
-
A survey of mobile malware in the wild
-
New York, NY, USA ACM
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 3-14, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
13
-
-
80052014671
-
The effectiveness of install-time permission systems for third-party applications
-
University of California, Berkeley, Dec
-
A. P. Felt, K. Greenwood, and D. Wagner. The effectiveness of install-time permission systems for third-party applications. Technical Report UCB/EECS-2010-143, EECS Department, University of California, Berkeley, Dec 2010.
-
(2010)
Technical Report UCB/EECS-2010-143, EECS Department
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
14
-
-
28444495934
-
Weighted support vector machine for classification with uneven training class sizes
-
Proceedings of 2005 International Conference on. IEEE
-
Y. Huang and S. Du. Weighted support vector machine for classification with uneven training class sizes. In Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on. IEEE, 2005.
-
(2005)
Machine Learning and Cybernetics, 2005
-
-
Huang, Y.1
Du, S.2
-
15
-
-
23744482045
-
Consumer processing of hazard warning information
-
June
-
W. A. Magat, W. K. Viscusi, and J. Huber. Consumer processing of hazard warning information. Journal of Risk and Uncertainty, 1(2):201-32, June 1988.
-
(1988)
Journal of Risk and Uncertainty
, vol.1
, Issue.2
, pp. 201-232
-
-
Magat, W.A.1
Viscusi, W.K.2
Huber, J.3
-
17
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
ACM
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 328-332. ACM, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
18
-
-
77950851532
-
Semantically rich application-centric security in android
-
ACSAC'09. Annual Ieee
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in android. In Computer Security Applications Conference, 2009. ACSAC'09. Annual, pages 340-349. Ieee, 2009.
-
(2009)
Computer Security Applications Conference, 2009
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
19
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
ACM
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, pages 347-356. ACM, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
21
-
-
77950125602
-
Detecting symbian os malware through static function call analysis
-
2009 4th International Conference on IEEE
-
A. Schmidt, J. Clausen, A. Camtepe, and S. Albayrak. Detecting symbian os malware through static function call analysis. In Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, pages 15-22. IEEE, 2009.
-
(2009)
Malicious and Unwanted Software (MALWARE)
, pp. 15-22
-
-
Schmidt, A.1
Clausen, J.2
Camtepe, A.3
Albayrak, S.4
-
22
-
-
11144338913
-
Intended and unintended consequences of warning messages: A review and synthesis of empirical research
-
D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy Marketing, 13(1):1-19, 1994.
-
(1994)
Journal of Public Policy Marketing
, vol.13
, Issue.1
, pp. 1-19
-
-
Stewart, D.W.1
Martin, I.M.2
-
26
-
-
33751019565
-
An introduction to support vector machines and other kernel-based learning methods
-
T. Zhang. An introduction to support vector machines and other kernel-based learning methods. AI Magazine, 2001.
-
(2001)
AI Magazine
-
-
Zhang, T.1
|