-
1
-
-
84897114466
-
-
last-accessed: 2011-09
-
The android developer's guide, last-accessed: 2011-09. http://developer.android.com/guide/index.html.
-
Android Developer's Guide
-
-
-
2
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
Chicago, Illinois, USA, October 4-8
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In ACM Conference on Computer and Communications Security (CCS 2010), pages 73-84, Chicago, Illinois, USA, October 4-8, 2010.
-
(2010)
ACM Conference on Computer and Communications Security (CCS 2010)
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
3
-
-
84866903193
-
Automatically securing permission-based software by reducing the attack surface: An application to android
-
Mar.
-
A. Bartel, J. Klein, M. Monperrus, and Y. Le Traon. Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. Report ISBN: 978-2-87971-107-2, University of Luxembourg, Mar. 2012.
-
(2012)
Report ISBN: 978-2-87971-107-2, University of Luxembourg
-
-
Bartel, A.1
Klein, J.2
Monperrus, M.3
Traon, Y.L.4
-
5
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM CCS, pages 235-245, New York, NY, USA, 2009.
-
(2009)
Proceedings of the 16th ACM CCS
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
8
-
-
80755172898
-
The effectiveness of application permissions
-
WebApps'11, Berkeley, CA, USA, USENIX Association
-
A. P. Felt, K. Greenwood, and D. Wagner. The effectiveness of application permissions. In Proceedings of the 2nd USENIX conference on Web application development, WebApps'11, pages 7-7, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 2nd USENIX Conference on Web Application Development
, pp. 7-7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
9
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In Proceedings of the 20th USENIX Security Symposium, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
11
-
-
77949898213
-
Modular string-sensitive permission analysis with demand-driven precision
-
IEEE
-
E. Geay, M. Pistoia, T. Tateishi, B. G. Ryder, and J. Dolby. Modular string-sensitive permission analysis with demand-driven precision. In ICSE, pages 177-187. IEEE, 2009.
-
(2009)
ICSE
, pp. 177-187
-
-
Geay, E.1
Pistoia, M.2
Tateishi, T.3
Ryder, B.G.4
Dolby, J.5
-
13
-
-
84866952607
-
Zeus banking trojan variant attacks android smartphones
-
S. Hoffman. Zeus banking trojan variant attacks android smartphones. CRN, 2011. http://goo.gl/xAEGr.
-
(2011)
CRN
-
-
Hoffman, S.1
-
14
-
-
0038108908
-
Access rights analysis for Java
-
Nov.
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access rights analysis for Java. ACM SIGPLAN Notices, 37(11):359-372, Nov. 2002.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.11
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
17
-
-
84860652586
-
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
-
April
-
C. Marforio, A. Francillon, and S. ̌Capkun. Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Technical Report 724, ETH Zurich, April 2011.
-
(2011)
Technical Report 724, ETH Zurich
-
-
Marforio, C.1
Francillon, A.2
Capkun, Š.3
-
18
-
-
34548808043
-
When role models have flaws: Static validation of enterprise security policies
-
M. Pistoia, S. J. Fink, R. J. Flynn, and E. Yahav. When role models have flaws: Static validation of enterprise security policies. In ICSE, 2007.
-
(2007)
ICSE
-
-
Pistoia, M.1
Fink, S.J.2
Flynn, R.J.3
Yahav, E.4
|