-
1
-
-
84866613786
-
-
May
-
Google Play. https://play.google.com/store, May 2012.
-
(2012)
Google Play
-
-
-
3
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android Permissions: User Attention, Comprehension, and Behavior. In SOUPS, 2012.
-
(2012)
SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
5
-
-
80755187788
-
Android permissions demystified
-
A.P.Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In ACM CCS, 2011.
-
(2011)
ACM CCS
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
6
-
-
84865640962
-
Privacy diffusion on the web: A longitudinal perspective
-
B. Krishnamurthy and C. E. Willis. Privacy diffusion on the web: A longitudinal perspective. In WWW, 2009.
-
(2009)
WWW
-
-
Krishnamurthy, B.1
Willis, C.E.2
-
7
-
-
78149331323
-
Internet inter-domain trafic
-
C. Labovitz, S. Iekel-Johnson, D. McPherson, J. Oberheide, and F. Jahanian. Internet inter-domain trafic. In ACM SIGCOMM, 2010.
-
(2010)
ACM SIGCOMM
-
-
Labovitz, C.1
Iekel-Johnson, S.2
McPherson, D.3
Oberheide, J.4
Jahanian, F.5
-
8
-
-
84860652586
-
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
-
C. Marforio, F. Aurelien, and S. Capkun. Application collusion attack on the permission-based security model and its implications for modern smartphone systems. In Technical Report 724, ETH Zurich, 2011.
-
(2011)
Technical Report 724, ETH Zurich
-
-
Marforio, C.1
Aurelien, F.2
Capkun, S.3
-
9
-
-
79957550033
-
LiveLab: Measuring wireless networks and smartphone users in the field
-
C. Shepard, A. Rahmati, C. Tossell, L. Zhong, and P. Kortum. LiveLab: Measuring Wireless Networks and Smartphone Users in the Field. In HotMetrics, 2010.
-
(2010)
HotMetrics
-
-
Shepard, C.1
Rahmati, A.2
Tossell, C.3
Zhong, L.4
Kortum, P.5
-
12
-
-
84890077123
-
Profiling resource usage for mobile apps: A cross-layer approach
-
F. Qian, Z. Wang, A. Gerber, Z. Morley Mao, S. Sen, and O. Spatscheck. Profiling Resource Usage for Mobile apps: a Cross-layer Approach. In ACM MobiSys, 2011.
-
(2011)
ACM MobiSys
-
-
Qian, F.1
Wang, Z.2
Gerber, A.3
Mao, Z.M.4
Sen, S.5
Spatscheck, O.6
-
13
-
-
79952973267
-
A first look at mobile hand-held device trafic
-
G. Maier, F. Schneider, and A. Feldmann. A First Look at Mobile Hand-held Device Trafic. In PAM, 2010.
-
(2010)
PAM
-
-
Maier, G.1
Schneider, F.2
Feldmann, A.3
-
14
-
-
84881594345
-
A first look at trafic on smartphones
-
H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin. A First Look at Trafic on Smartphones. In ACM IMC, 2010.
-
(2010)
ACM IMC
-
-
Falaki, H.1
Lymberopoulos, D.2
Mahajan, R.3
Kandula, S.4
Estrin, D.5
-
15
-
-
79961041677
-
SystemSens: A tool for monitoring usage in smartphone research deployments
-
H.Falaki, R.Mahajan, and D. Estrin. SystemSens: A Tool for Monitoring Usage in Smartphone Research Deployments. In ACM MobiArch, 2011.
-
(2011)
ACM MobiArch
-
-
Falaki, H.1
Mahajan, R.2
Estrin, D.3
-
16
-
-
77955038912
-
Diversity in smartphone usage
-
H.Falaki, R.Mahajan, S. Kandula, D.Lymberopoulos, R.Govindan, and D.Estrin . Diversity in Smartphone Usage. In ACM MobiSys, 2010.
-
(2010)
ACM MobiSys
-
-
Falaki, H.1
Mahajan, R.2
Kandula, S.3
Lymberopoulos, D.4
Govindan, R.5
Estrin, D.6
-
17
-
-
84870769313
-
Crowdroid: Behavior-based malware detection system for Android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for Android. In SPSM, 2011.
-
(2011)
SPSM
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
19
-
-
84881574863
-
Anatomizing app performance differences on smartphones
-
J. Huang, Q. Xu, B. Tiwana, Z. M. Mao, M. Zhang, and P. Bahl. Anatomizing app Performance Differences on Smartphones. In ACM MobiSys, 2010.
-
(2010)
ACM MobiSys
-
-
Huang, J.1
Xu, Q.2
Tiwana, B.3
Mao, Z.M.4
Zhang, M.5
Bahl, P.6
-
20
-
-
77952331717
-
PBMDS: A behavior-based malware detection system for cellphone devices
-
L. Xie, X. Zhang, J.-P. Seifert, and S. Zhu. pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In ACM WiSec, 2010.
-
(2010)
ACM WiSec
-
-
Xie, L.1
Zhang, X.2
Seifert, J.-P.3
Zhu, S.4
-
21
-
-
78650632079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. Dick, Z. M. Mao, and L. Yang. Accurate Online Power Estimation and Automatic Battery Behavior Based Power Model Generation for Smartphones. In CODES+ISSS, 2010.
-
(2010)
CODES+ISSS
-
-
Zhang, L.1
Tiwana, B.2
Qian, Z.3
Wang, Z.4
Dick, R.5
Mao, Z.M.6
Yang, L.7
-
23
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones . In NDSS, 2012.
-
(2012)
NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
25
-
-
80755187778
-
These arenâǎźt the droids youâǎź re looking for: Retroïň, Atting Android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These arenâǍŹt the Droids youâǍŹre looking for: Retroïň, Atting Android to protect data from imperious applications. In ACM CCS, 2011.
-
(2011)
ACM CCS
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
26
-
-
82955197342
-
Identify diverse usage behaviors of smartphone apps
-
Q. Xu, J. Erman, A. Gerber, Z. Morley Mao, J. Pang, and S. Venkataraman. Identify Diverse Usage Behaviors of Smartphone Apps. In IMC, 2011.
-
(2011)
IMC
-
-
Xu, Q.1
Erman, J.2
Gerber, A.3
Mao, Z.M.4
Pang, J.5
Venkataraman, S.6
-
27
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In NDSS, 2011.
-
(2011)
NDSS
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
28
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A. Sadeghi, and B.Shastry. Towards Taming Privilege-Escalation Attacks on Android . In NDSS, 2012.
-
(2012)
NDSS
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.5
Shastry, B.6
-
30
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang and P. McDaniel. On Lightweight Mobile Phone Application Certification. In ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
31
-
-
79955570859
-
Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
32
-
-
84866623952
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang. Dissecting Android Malware: Characterization and Evolution. In IEEE S&P, 2012.
-
(2012)
IEEE S&P
-
-
Zhou, Y.1
Jiang, X.2
-
33
-
-
84869439259
-
Get off of my market: Detecting malicious apps in o-cial and alternative android markets
-
Y. Zhou, Z. Wang, Wu Zhou and X. Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in O-cial and Alternative Android Markets . In NDSS, 2012.
-
(2012)
NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Hey, X.Jiang.4
You5
|