-
1
-
-
84866670655
-
-
Aug.
-
Adobe livecycle rights management es. http://www.adobe.com/products/ livecycle/rightsmanagement/indepth.html, Aug. 2010.
-
(2010)
-
-
-
2
-
-
84885884531
-
Context-aware usage control for android
-
G. Bai, L. Gu, T. Feng, Y. Guo, and X. Chen. Context-aware usage control for android. In SecureComm, pages 326-343, 2010.
-
(2010)
SecureComm
, pp. 326-343
-
-
Bai, G.1
Gu, L.2
Feng, T.3
Guo, Y.4
Chen, X.5
-
3
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
New York, NY, USA. ACM
-
D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 73-84, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.2
Van Oorschot, P.3
Somayaji, A.4
-
5
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
J. Clause, W. Li, and A. Orso. Dytan: a generic dynamic taint analysis framework. In Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, pages 196-206, 2007.
-
(2007)
Proceedings of the 2007 International Symposium on Software Testing and Analysis, ISSTA '07
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
6
-
-
71649111935
-
The S3MS.NET run time monitor: Tool demonstration
-
L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts, F. Piessens, and D. Vanoverberghe. The S3MS.NET Run Time Monitor: Tool Demonstration. ENTCS, 253(5):153-159, 2009.
-
(2009)
ENTCS
, vol.253
, Issue.5
, pp. 153-159
-
-
Desmet, L.1
Joosen, W.2
Massacci, F.3
Naliuka, K.4
Philippaerts, P.5
Piessens, F.6
Vanoverberghe, D.7
-
7
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
To appear
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. 9th USENIX Symposium on Operating Systems Design and Implementation, 2010. To appear.
-
(2010)
Proc. 9th USENIX Symposium on Operating Systems Design and Implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
8
-
-
60049085302
-
Understanding android security
-
jan.-feb.
-
W. Enck, M. Ongtang, and P. McDaniel. Understanding android security. Security Privacy, IEEE, 7(1):50-57, jan.-feb. 2009.
-
(2009)
Security Privacy, IEEE
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
10
-
-
84866642442
-
-
November
-
Gartner. http://www.gartner.com/it/page.jsp?id=1848514, November 2011.
-
(2011)
-
-
-
11
-
-
70350572805
-
Flow-sensitive, contextsensitive, and object-sensitive information flow control based on program dependence graphs
-
C. Hammer and G. Snelting. Flow-sensitive, contextsensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Sec., 8(6):399-422, 2009.
-
(2009)
Int. J. Inf. Sec.
, vol.8
, Issue.6
, pp. 399-422
-
-
Hammer, C.1
Snelting, G.2
-
12
-
-
72849109064
-
State-based usage control enforcement with data flow tracking using system call interposition
-
M. Harvan and A. Pretschner. State-based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. In Proc. 3rd Intl. Conf. on Network and System Security, pages 373-380, 2009.
-
(2009)
Proc. 3rd Intl. Conf. on Network and System Security
, pp. 373-380
-
-
Harvan, M.1
Pretschner, A.2
-
14
-
-
38049040380
-
A policy language for distributed usage control
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter. A policy language for distributed usage control. In Proc. ESORICS, pages 531-546, 2007.
-
(2007)
Proc. ESORICS
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
15
-
-
48649101461
-
Extending the Java virtual machine to enforce fine-grained security policies in mobile devices
-
IEEE Computer Society
-
I. Ion, B. Dragovic, and B. Crispo. Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. In Proc. Annual Computer Security Applications Conference, pages 233-242. IEEE Computer Society, 2007.
-
(2007)
Proc. Annual Computer Security Applications Conference
, pp. 233-242
-
-
Ion, I.1
Dragovic, B.2
Crispo, B.3
-
16
-
-
79952779062
-
Distributed data usage control for web applications: A social network implementation
-
P. Kumari, A. Pretschner, J. Peschla, and J.-M. Kuhn. Distributed data usage control for web applications: a social network implementation. In Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pages 85-96, 2011.
-
(2011)
Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY '11
, pp. 85-96
-
-
Kumari, P.1
Pretschner, A.2
Peschla, J.3
Kuhn, J.-M.4
-
18
-
-
79952778176
-
-
Microsoft. Windows Rights Management Services. http://www.microsoft.com/ windowsserver2008/en/us/ad-rms-overview.aspx, 2010.
-
(2010)
Windows Rights Management Services
-
-
-
19
-
-
79960969877
-
Design and implementation of a fine-grained resource usage model for the android platform
-
M. Nauman and S. Khan. Design and implementation of a fine-grained resource usage model for the android platform. Int. Arab J. Inf. Technol., 8(4):440-448, 2011.
-
(2011)
Int. Arab J. Inf. Technol.
, vol.8
, Issue.4
, pp. 440-448
-
-
Nauman, M.1
Khan, S.2
-
20
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software
-
San Diego, California, USA
-
J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA, 2005.
-
(2005)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2005
-
-
Newsome, J.1
Song, D.X.2
-
21
-
-
78751555807
-
Porscha: Policy oriented secure content handling in android
-
New York, NY, USA, ACM
-
M. Ongtang, K. Butler, and P. McDaniel. Porscha: policy oriented secure content handling in android. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 221-230, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 221-230
-
-
Ongtang, M.1
Butler, K.2
McDaniel, P.3
-
22
-
-
77950851532
-
Semantically rich application-centric security in android
-
dec.
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in android. In Computer Security Applications Conference, 2009. ACSAC '09. Annual, pages 340 -349, dec. 2009.
-
(2009)
Computer Security Applications Conference, 2009. ACSAC '09. Annual
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
23
-
-
3142523603
-
The UCON ABC usage control model
-
J. Park and R. Sandhu. The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
24
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
New York, NY, USA, ACM
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 347-356, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
25
-
-
79952798543
-
Usage control enforcement with data flow tracking for x11
-
A. Pretschner, M. Buechler, M. Harvan, C. Schaefer, and T. Walter. Usage control enforcement with data flow tracking for x11. In Proc. 5th Intl. Workshop on Security and Trust Management, pages 124-137, 2009.
-
(2009)
Proc. 5th Intl. Workshop on Security and Trust Management
, pp. 124-137
-
-
Pretschner, A.1
Buechler, M.2
Harvan, M.3
Schaefer, C.4
Walter, T.5
-
26
-
-
33748543201
-
Distributed usage control
-
A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Commun. ACM, 49(9):39-44, 2006.
-
(2006)
Commun. ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
27
-
-
77950675112
-
Google android: A comprehensive security assessment
-
march-april
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. Google android: A comprehensive security assessment. Security Privacy, IEEE, 8(2):35-44, march-april 2010.
-
(2010)
Security Privacy, IEEE
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
28
-
-
58449129985
-
Bitblaze: A new approach to computer security via binary analysis
-
D. X. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. Bitblaze: A new approach to computer security via binary analysis. In ICISS, pages 1-25, 2008.
-
(2008)
ICISS
, pp. 1-25
-
-
Song, D.X.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
30
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In Proc IEEE Symposium on Security and Privacy, pages 79-93, 2009.
-
(2009)
Proc. IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
31
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. Freeh. Taming information-stealing smartphone applications (on android). In 4th International Conference on Trust and Trustworthy Computing, Pittsburgh, Pa., 2011.
-
(2011)
4th International Conference on Trust and Trustworthy Computing, Pittsburgh, Pa.
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
|