메뉴 건너뛰기




Volumn , Issue , 2012, Pages 274-277

Automatically securing permission-based software by reducing the attack surface: An application to android

Author keywords

Android; Call graph; Permission based software; Permissions; Security; Soot; Static analysis

Indexed keywords

ANDROID; CALL-GRAPH; CODE INJECTION; DATA SETS; MALWARES; PERMISSION-BASED SECURITY; PERMISSIONS; SECURITY; ANDROID APPLICATIONS;

EID: 84866946869     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2351676.2351722     Document Type: Conference Paper
Times cited : (114)

References (19)
  • 1
    • 84897114466 scopus 로고    scopus 로고
    • last-accessed: 2011-09
    • The android developer's guide, last-accessed: 2011-09. http://developer.android.com/guide/index.html.
    • Android Developer's Guide
  • 5
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • New York, NY, USA
    • W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM CCS, pages 235-245, New York, NY, USA, 2009.
    • (2009) Proceedings of the 16th ACM CCS , pp. 235-245
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 11
    • 77949898213 scopus 로고    scopus 로고
    • Modular string-sensitive permission analysis with demand-driven precision
    • IEEE
    • E. Geay, M. Pistoia, T. Tateishi, B. G. Ryder, and J. Dolby. Modular string-sensitive permission analysis with demand-driven precision. In ICSE, pages 177-187. IEEE, 2009.
    • (2009) ICSE , pp. 177-187
    • Geay, E.1    Pistoia, M.2    Tateishi, T.3    Ryder, B.G.4    Dolby, J.5
  • 12
    • 80755127527 scopus 로고    scopus 로고
    • Androidleaks detecting privacy leaks in android applications
    • UC Davis
    • C. Gibler, J. Crussel, J. Erickson, and H. Chen. Androidleaks detecting privacy leaks in android applications. Technical report, UC Davis, 2011.
    • (2011) Technical Report
    • Gibler, C.1    Crussel, J.2    Erickson, J.3    Chen, H.4
  • 13
    • 84866952607 scopus 로고    scopus 로고
    • Zeus banking trojan variant attacks android smartphones
    • S. Hoffman. Zeus banking trojan variant attacks android smartphones. CRN, 2011. http://goo.gl/xAEGr.
    • (2011) CRN
    • Hoffman, S.1
  • 17
    • 84860652586 scopus 로고    scopus 로고
    • Application collusion attack on the permission-based security model and its implications for modern smartphone systems
    • April
    • C. Marforio, A. Francillon, and S. ̌Capkun. Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Technical Report 724, ETH Zurich, April 2011.
    • (2011) Technical Report 724, ETH Zurich
    • Marforio, C.1    Francillon, A.2    Capkun, Š.3
  • 18
    • 34548808043 scopus 로고    scopus 로고
    • When role models have flaws: Static validation of enterprise security policies
    • M. Pistoia, S. J. Fink, R. J. Flynn, and E. Yahav. When role models have flaws: Static validation of enterprise security policies. In ICSE, 2007.
    • (2007) ICSE
    • Pistoia, M.1    Fink, S.J.2    Flynn, R.J.3    Yahav, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.