-
3
-
-
84867462675
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, et al., "A methodology for empirical analysis of permission-based security models and its application to android, " In Proc. CCS, 2010.
-
(2010)
Proc. CCS
-
-
Barrera, D.1
-
4
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
A. Barth, et al., "Privacy and Contextual Integrity: Framework and Applications, " In Proc. IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proc. IEEE Symposium on Security and Privacy
-
-
Barth, A.1
-
5
-
-
80054902317
-
Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs
-
M. Benisch, et al., "Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs, " Personal and Ubiquitous Computing, 2010.
-
(2010)
Personal and Ubiquitous Computing
-
-
Benisch, M.1
-
6
-
-
84976246004
-
MockDroid: Trading privacy for application functionality on smartphones
-
A. Beresford, et al., "MockDroid: trading privacy for application functionality on smartphones, " In Proc. HotMobile, 2011.
-
(2011)
Proc. HotMobile
-
-
Beresford, A.1
-
7
-
-
80755135085
-
Soylent: A word processor with a crowd inside
-
M. S. Bernstein, et al., "Soylent: a word processor with a crowd inside, " In Proc. UIST, 2010.
-
(2010)
Proc. UIST
-
-
Bernstein, M.S.1
-
8
-
-
85029424989
-
Bridging the gap in computer security warnings: A mental model approach
-
C. Bravo-Lillo, et al., "Bridging the gap in computer security warnings: a mental model approach, " IEEE Security & Privacy Magazine, 2010.
-
(2010)
IEEE Security & Privacy Magazine
-
-
Bravo-Lillo, C.1
-
9
-
-
70350230128
-
Mental models of privacy and security
-
IEEE
-
L. J. Camp, "Mental models of privacy and security, " Technology and Society Magazine, IEEE, vol. 28, 2009.
-
(2009)
Technology and Society Magazine
, vol.28
-
-
Camp, L.J.1
-
10
-
-
84903569299
-
Analyzing inter-application communication in Android
-
E. Chin, et al., "Analyzing inter-application communication in Android, " In Proc. MobiSys, 2011.
-
(2011)
Proc. MobiSys
-
-
Chin, E.1
-
12
-
-
84868243480
-
PiOS: Detecting privacy leaks in iOS applications
-
M. Egele, et al., "PiOS: Detecting Privacy Leaks in iOS Applications, " In Proc. NDSS, 2011.
-
(2011)
Proc. NDSS
-
-
Egele, M.1
-
14
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, et al., "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, " In Proc. OSDI 2010.
-
(2010)
Proc. OSDI
-
-
Enck, W.1
-
15
-
-
85025700509
-
A study of android application security
-
W. Enck, et al., "A Study of Android Application Security, " In Proc. USENIX Security Symposium, 2011.
-
(2011)
Proc. USENIX Security Symposium
-
-
Enck, W.1
-
16
-
-
84909640295
-
Android permissions demystified
-
A. P. Felt, et al., "Android permissions demystified, " In Proc. CCS, 2011.
-
(2011)
Proc. CCS
-
-
Felt, A.P.1
-
17
-
-
84864866297
-
A survey of mobile malware in the wild
-
A. P. Felt, et al., "A survey of mobile malware in the wild, " In Proc. SPSM, 2011.
-
(2011)
Proc. SPSM
-
-
Felt, A.P.1
-
18
-
-
84867463760
-
-
UCB/EECS-2012-26, University of California, Berkeley
-
A. P. Felt, et al., "Android Permissions: User Attention, Comprehension, and Behavior, " UCB/EECS-2012-26, University of California, Berkeley, 2012.
-
(2012)
Android Permissions: User Attention, Comprehension, and Behavior
-
-
Felt, A.P.1
-
19
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, et al., "Permission re-delegation: attacks and defenses, " In Proc. USENIX conference on Security, 2011.
-
(2011)
Proc. USENIX Conference on Security
-
-
Felt, A.P.1
-
20
-
-
33745862646
-
Stopping spyware at the gate: A user study of privacy, notice and spyware
-
N. Good, et al., "Stopping spyware at the gate: a user study of privacy, notice and spyware, " In Proc. SOUPS, 2005.
-
(2005)
Proc. SOUPS
-
-
Good, N.1
-
22
-
-
84917725040
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, et al., "These aren't the droids you're looking for: retrofitting android to protect data from imperious applications, " In Proc. CCS, 2011.
-
(2011)
Proc. CCS
-
-
Hornyack, P.1
-
23
-
-
19944381365
-
Privacy policies as decision-making tools: An evaluation of online privacy notices
-
C. Jensen and C. Potts, "Privacy policies as decision-making tools: an evaluation of online privacy notices, " In Proc. CHI, 2004.
-
(2004)
Proc. CHI
-
-
Jensen, C.1
Potts, C.2
-
25
-
-
70350731253
-
A nutrition label for privacy
-
P. G. Kelley, et al., "A "nutrition label" for privacy, " In Proc. SOUPS, 2009.
-
(2009)
Proc. SOUPS
-
-
Kelley, P.G.1
-
26
-
-
84867438639
-
A Conundrum of permissions: Installing applications on an android smartphone
-
P. G. Kelley, et al., "A Conundrum of permissions: Installing Applications on an Android Smartphone, " In Proc. USEC, 2012.
-
(2012)
Proc. USEC
-
-
Kelley, P.G.1
-
27
-
-
84867456895
-
Smartening the crowds: Computational techniques for improving human verification to fight phishing scams
-
G. Liu, et al., "Smartening the crowds: computational techniques for improving human verification to fight phishing scams, " In Proc. SOUPS, 2011.
-
(2011)
Proc. SOUPS
-
-
Liu, G.1
-
28
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, et al., "Apex: extending Android permission model and enforcement with user-defined runtime constraints, " In Proc. ASIACCS, 2010.
-
(2010)
Proc. ASIACCS
-
-
Nauman, M.1
-
29
-
-
1542370340
-
The design of everyday things
-
D. Norman, The design of everyday things: Basic Books, 2002.
-
(2002)
Basic Books
-
-
Norman, D.1
-
30
-
-
10844259286
-
Unpacking privacy,for a networked world
-
L. Palen and P. Dourish, "Unpacking "privacy" for a networked world, " In Proc. CHI, 2003.
-
(2003)
Proc. CHI
-
-
Palen, L.1
Dourish, P.2
-
32
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
N. Sadeh, et al., "Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application, " The Journal of Personal and Ubiquitous Computing, 2009.
-
(2009)
The Journal of Personal and Ubiquitous Computing
-
-
Sadeh, N.1
-
33
-
-
33644925852
-
-
University of Pennsylvania Law Review, January
-
D. J. Solove, "A Taxonomy of Privacy, " University of Pennsylvania Law Review, Vol. 154, No. 3, January 2006.
-
(2006)
A Taxonomy of Privacy
, vol.154
, Issue.3
-
-
Solove, D.J.1
-
36
-
-
84864037440
-
Curbing android permission creep
-
T. Vidas, et al., "Curbing android permission creep, " Proceedings of the Web, vol. 2, 2011.
-
(2011)
Proceedings of the Web
, vol.2
-
-
Vidas, T.1
-
38
-
-
79951633637
-
Folk models of home computer security
-
R. Wash, "Folk models of home computer security, " In Proc. SOUPS, 2010.
-
(2010)
Proc. SOUPS
-
-
Wash, R.1
-
39
-
-
84872325256
-
Taming information-stealing smartphone applications (on Android)
-
Y. Zhou, et al., "Taming Information-Stealing Smartphone Applications (on Android), " In Proc. TRUST, 2011.
-
(2011)
Proc. TRUST
-
-
Zhou, Y.1
|