메뉴 건너뛰기




Volumn , Issue , 2012, Pages 388-396

Repackaging android applications for auditing access to private data

Author keywords

android; permissions; privacy; security

Indexed keywords

ANDROID; BYTECODES; MALWARES; PERMISSIONS; PRIVACY VIOLATION; PRIVATE DATA; SECURITY; THIRD PARTY APPLICATION (APPS);

EID: 84869458610     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2012.74     Document Type: Conference Paper
Times cited : (31)

References (24)
  • 1
    • 80051520848 scopus 로고    scopus 로고
    • Mobile Attacks and Defense
    • Jul.
    • C. Miller, "Mobile Attacks and Defense," IEEE Security & Privacy Magazine, vol. 9, no. 4, pp. 68-70, Jul. 2011.
    • (2011) IEEE Security & Privacy Magazine , vol.9 , Issue.4 , pp. 68-70
    • Miller, C.1
  • 3
    • 79957604407 scopus 로고    scopus 로고
    • Secure Software Installation on Smartphones
    • May
    • D. Barrera and P. Van Oorschot, "Secure Software Installation on Smartphones," IEEE Security & Privacy Magazine, vol. 9, no. 3, pp. 42-48, May 2011.
    • (2011) IEEE Security & Privacy Magazine , vol.9 , Issue.3 , pp. 42-48
    • Barrera, D.1    Van Oorschot, P.2
  • 9
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending Android permission model and enforcement with user-defined runtime constraints
    • Beijing, China: ACM Press, Apr.
    • M. Nauman, S. Khan, and X. Zhang, "Apex: extending Android permission model and enforcement with user-defined runtime constraints," in 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM Press, Apr. 2010, pp. 328-332.
    • (2010) 5th ACM Symposium on Information, Computer and Communications Security , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 12
    • 72349098599 scopus 로고    scopus 로고
    • Towards Formal Analysis of the Permission-Based Security Model for Android
    • Cannes/La Bocca, French Riviera, France: IEEE Computer Society
    • W. Shin, S. Kiyomoto, K. Fukushima, and T. Tanaka, "Towards Formal Analysis of the Permission-Based Security Model for Android," in Fifth International Conference on Wireless and Mobile Communications. Cannes/La Bocca, French Riviera, France: IEEE Computer Society, 2009, pp. 87-92.
    • (2009) Fifth International Conference on Wireless and Mobile Communications , pp. 87-92
    • Shin, W.1    Kiyomoto, S.2    Fukushima, K.3    Tanaka, T.4
  • 13
    • 78649293466 scopus 로고    scopus 로고
    • A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework
    • Minneapolis, Minnesota, USA: IEEE Computer Society, Aug.
    • -, "A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework," in Second International Conference on Social Computing. Minneapolis, Minnesota, USA: IEEE Computer Society, Aug. 2010, pp. 944-951.
    • (2010) Second International Conference on Social Computing , pp. 944-951
    • Shin, W.1    Kiyomoto, S.2    Fukushima, K.3    Tanaka, T.4
  • 14
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • Chicago, Illinois, USA: ACM Press, Oct.
    • A. Barrera, David and Kayacik, H. Güneş and van Oorschot, Paul C. and Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android," in 17th ACM conference on Computer and communications security. Chicago, Illinois, USA: ACM Press, Oct. 2010, pp. 73-84.
    • (2010) 17th ACM Conference on Computer and Communications Security , pp. 73-84
    • Barrera, A.1    David2    Kayacik3    Güneş, H.4    Van Oorschot, P.C.5    Somayaji6
  • 15
    • 80155126749 scopus 로고    scopus 로고
    • Various approaches in analyzing Android applications with its permission-based security models
    • Mankato, Minnesota, USA: IEEE Computer Society, May
    • I. Rassameeroj and Y. Tanahashi, "Various approaches in analyzing Android applications with its permission-based security models," in International Conference on Electro/Information Technology. Mankato, Minnesota, USA: IEEE Computer Society, May 2011, pp. 1-6.
    • (2011) International Conference on Electro/Information Technology , pp. 1-6
    • Rassameeroj, I.1    Tanahashi, Y.2
  • 17
    • 85137132511 scopus 로고    scopus 로고
    • Detecting repackaged smartphone applications in third-party android marketplaces
    • E. Bertino and R. S. Sandhu, Eds. San Antonio, TX, USA: ACM Press, Feb.
    • W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "Detecting repackaged smartphone applications in third-party android marketplaces," in Second ACM conference on Data and Application Security and Privacy, E. Bertino and R. S. Sandhu, Eds. San Antonio, TX, USA: ACM Press, Feb. 2012, pp. 317-326.
    • (2012) Second ACM Conference on Data and Application Security and Privacy , pp. 317-326
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3    Ning, P.4
  • 18
    • 84870632086 scopus 로고    scopus 로고
    • Online. Available
    • Mila, "Contagio mobile," 2012. [Online]. Available: http://contagiominidump.blogspot.fr/
    • (2012) Contagio Mobile
    • Mila1
  • 19
    • 84870636888 scopus 로고    scopus 로고
    • All data stored on your smartphone... gone in 60 seconds
    • Online. Available
    • L. Botezatu, "All data stored on your smartphone ..... gone in 60 seconds," MalwareCity, 2011. [Online]. Available: http://www.malwarecity. com/blog/all-data-stored-on-your-smartphone-gone-in-60-seconds-1156.html
    • (2011) MalwareCity
    • Botezatu, L.1
  • 20
    • 84870647546 scopus 로고    scopus 로고
    • Android.Fakesucon
    • Online. Available
    • "Android.Fakesucon," Symantec Security Response's blog, 2011. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp? docid=2011-120915-2524-99
    • (2011) Symantec Security Response's Blog
  • 22
    • 84870634878 scopus 로고    scopus 로고
    • Online. Available
    • Y. Li, "Android.Lovetrap," 2011. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2011-072806-2905-99
    • (2011) Android.Lovetrap
    • Li, Y.1
  • 23
    • 84870647958 scopus 로고    scopus 로고
    • Server-side Polymorphic Android Applications
    • Online. Available
    • "Server-side Polymorphic Android Applications," Symantec Security Response's blog, 2012. [Online]. Available: http://www.symantec.com/ connect/blogs/server-side-polymorphic-android-applications
    • (2012) Symantec Security Response's Blog
  • 24
    • 84870632513 scopus 로고    scopus 로고
    • Android Threat Tackles Piracy Using Austere Justice Measures
    • Online. Available
    • I. Asrar, "Android Threat Tackles Piracy Using Austere Justice Measures," Irfan Asrar's blog, 2011. [Online]. Available: http://www.symantec.com/connect/blogs/android-threat-tackles-piracy-using- austere-justice-measures
    • (2011) Irfan Asrar's Blog
    • Asrar, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.