-
1
-
-
84863954784
-
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
-
Armando, A., Merlo, A., Verderame, M.M.: Would you mind forking this process? A denial of service attack on Android (and some countermeasures). In: Proc. IFIP SEC (2012)
-
Proc. IFIP SEC (2012)
-
-
Armando, A.1
Merlo, A.2
Verderame, M.M.3
-
2
-
-
84875264064
-
Towards taming privilege-escalation attacks on Android
-
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R., Shastry, B.: Towards taming privilege-escalation attacks on Android. In: Proc. NDSS (2012)
-
Proc. NDSS (2012)
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.R.5
Shastry, B.6
-
3
-
-
84870749892
-
Practical and lightweight domain isolation on Android
-
Bugiel, S., Davi, L., Dmitrienko, A., Heuser, S., Sadeghi, A.R., Shastry, B.: Practical and lightweight domain isolation on Android. In: Proc. SPSM (2011)
-
Proc. SPSM (2011)
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Heuser, S.4
Sadeghi, A.R.5
Shastry, B.6
-
5
-
-
84903569299
-
Analyzing inter-application communication in Android
-
Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proc. MobiSys (2011)
-
Proc. MobiSys (2011)
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
6
-
-
85037073388
-
Privilege Escalation Attacks on Android
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
-
Davi, L., Dmitrienko, A., Sadeghi, A.R.,Winandy,M.: Privilege Escalation Attacks on Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346-360. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6531
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.R.3
Winandy, M.4
-
7
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: Quire: Lightweight provenance for smart phone operating systems. In: Proc. USENIX Security (2011)
-
Proc. USENIX Security (2011)
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
8
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck,W., Gilbert, P., Gon Chun, B., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In: Proc. USENIX OSDI (2010)
-
Proc. USENIX OSDI (2010)
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
9
-
-
85025700509
-
A study of Android application security
-
Enck,W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: Proc. USENIX Security (2011)
-
Proc. USENIX Security (2011)
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
11
-
-
80755187788
-
Android permissions demystified
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proc. CCS (2011)
-
Proc. CCS (2011)
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
12
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
Felt, A.P., Wang, H., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: Attacks and defenses. In: Proc. USENIX Security (2011)
-
Proc. USENIX Security (2011)
-
-
Felt, A.P.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
13
-
-
84888301034
-
-
Tech. Rep. CMU-CyLab-11-020, CyLab, Carnegie Mellon University
-
Fragkaki, E., Bauer, L., Jia, L.: Modeling and enhancing Android's permission system. Tech. Rep. CMU-CyLab-11-020, CyLab, Carnegie Mellon University (2011)
-
(2011)
Modeling and Enhancing Android's Permission System
-
-
Fragkaki, E.1
Bauer, L.2
Jia, L.3
-
14
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications
-
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications. In: Proc. CCS (2011)
-
Proc. CCS (2011)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
15
-
-
84866374792
-
-
accessed April 10, 2012
-
Lineberry, A., Richardson, D.L., Wyatt, T.: These aren't the permissions you're looking for (2010), www.defcon.org/images/defcon-18/dc-18-presentations/ Lineberry/DEFCON-18-Lineberry-Not-The-Permissions-You-Are-Looking-For.pdf (accessed April 10, 2012)
-
(2010)
These Aren't the Permissions You're Looking for
-
-
Lineberry, A.1
Richardson, D.L.2
Wyatt, T.3
-
17
-
-
84865599123
-
Attacks on WebView in the Android system
-
Luo, T., Hao, H., Du, W., Wang, Y., Yin, H.: Attacks on WebView in the Android system. In: Proc. ACSAC (2011)
-
Proc. ACSAC (2011)
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
18
-
-
84860652586
-
-
Tech. Rep. 724, ETH Zurich
-
Marforio, C., Francillon, A., Čapkun, S.: Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Tech. Rep. 724, ETH Zurich (2011)
-
(2011)
Application Collusion Attack on the Permission-based Security Model and Its Implications for Modern Smartphone Systems
-
-
Marforio, C.1
Francillon, A.2
Čapkun, S.3
-
19
-
-
80052493767
-
Smartphone security evaluation - The malware attack case
-
Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D.: Smartphone security evaluation - The malware attack case. In: Proc. SECRYPT (2011)
-
Proc. SECRYPT (2011)
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
20
-
-
77954487766
-
Apex: Extending Android permission model and enforcement with user-defined runtime constraints
-
Nauman, M., Khan, S., Zhang, X.: Apex: extending Android permission model and enforcement with user-defined runtime constraints. In: Proc. ASIACCS (2010)
-
Proc. ASIACCS (2010)
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
21
-
-
84865599469
-
-
NTT Data Corporation: tomoyo.sourceforge.jp/ accessed April 10, 2012
-
NTT Data Corporation: TOMOYO Linux (2012), tomoyo.sourceforge.jp/ (accessed April 10, 2012)
-
(2012)
TOMOYO Linux
-
-
-
22
-
-
77950851532
-
Semantically rich application-centric security in Android
-
Ongtang, M., McLaughlin, S.E., Enck, W., McDaniel, P.D.: Semantically rich application-centric security in Android. In: Proc. ACSAC (2009)
-
Proc. ACSAC (2009)
-
-
Ongtang, M.1
McLaughlin, S.E.2
Enck, W.3
McDaniel, P.D.4
-
23
-
-
84865599121
-
-
hackmageddon.com/2011/08/11/one-year-of-android-malware-full-list/ accessed June 20, 2012
-
Passeri, P.: One year of Android malware (full list) (2011), hackmageddon.com/2011/08/11/one-year-of-android-malware-full-list/ (accessed June 20, 2012)
-
(2011)
One Year of Android Malware (Full List)
-
-
Passeri, P.1
-
24
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound Trojan for smartphones
-
Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A stealthy and context-aware sound Trojan for smartphones. In: Proc. NDSS (2011)
-
Proc. NDSS (2011)
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
25
-
-
78649293466
-
A formal model to analyze the permission authorization and enforcement in the Android framework
-
Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the Android framework. In: Proc. SocialCom/PASSAT (2010)
-
Proc. SocialCom/PASSAT (2010)
-
-
Shin, W.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
26
-
-
79951899261
-
A small but nonnegligible flaw in the Android permission scheme
-
Shin, W., Kwak, S., Kiyomoto, S., Fukushima, K., Tanaka, T.: A small but nonnegligible flaw in the Android permission scheme. In: Proc. POLICY (2010)
-
Proc. POLICY (2010)
-
-
Shin, W.1
Kwak, S.2
Kiyomoto, S.3
Fukushima, K.4
Tanaka, T.5
-
27
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party Android marketplaces
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party Android marketplaces. In: Proc. CODASPY 2012 (2012)
-
(2012)
Proc. CODASPY 2012
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|