-
1
-
-
80051520848
-
Mobile Attacks and Defense
-
Jul.
-
C. Miller, "Mobile Attacks and Defense," IEEE Security & Privacy Magazine, vol. 9, no. 4, pp. 68-70, Jul. 2011.
-
(2011)
IEEE Security & Privacy Magazine
, vol.9
, Issue.4
, pp. 68-70
-
-
Miller, C.1
-
2
-
-
85010349302
-
Android Security Permissions - Can we trust them?
-
C. Orthacker, P. Teufl, S. Kraxberger, A. Marsalek, J. Leibetseder, and O. Prevenhueber, "Android Security Permissions - Can we trust them?" in 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, vol. 3, 2011, p. 12.
-
(2011)
3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems
, vol.3
, pp. 12
-
-
Orthacker, C.1
Teufl, P.2
Kraxberger, S.3
Marsalek, A.4
Leibetseder, J.5
Prevenhueber, O.6
-
3
-
-
79957604407
-
Secure Software Installation on Smartphones
-
May
-
D. Barrera and P. Van Oorschot, "Secure Software Installation on Smartphones," IEEE Security & Privacy Magazine, vol. 9, no. 3, pp. 42-48, May 2011.
-
(2011)
IEEE Security & Privacy Magazine
, vol.9
, Issue.3
, pp. 42-48
-
-
Barrera, D.1
Van Oorschot, P.2
-
4
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
-
IEEE Computer Society, Oct.
-
L. Batyuk, M. Herpich, S. A. Camtepe, K. Raddatz, A.-D. Schmidt, and S. Albayrak, "Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications," in 6th International Conference on Malicious and Unwanted Software. IEEE Computer Society, Oct. 2011, pp. 66-72.
-
(2011)
6th International Conference on Malicious and Unwanted Software
, pp. 66-72
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S.A.3
Raddatz, K.4
Schmidt, A.-D.5
Albayrak, S.6
-
5
-
-
80052297069
-
Emerging security threats for mobile platforms
-
G. Delac, M. Silic, and J. Krolo, "Emerging security threats for mobile platforms," in 34th International Convention, 2011, pp. 1468-1473.
-
(2011)
34th International Convention
, pp. 1468-1473
-
-
Delac, G.1
Silic, M.2
Krolo, J.3
-
7
-
-
80755181021
-
A survey of mobile malware in the wild
-
New York, New York, USA: ACM Press, Oct.
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in 1st ACM workshop on Security and privacy in smartphones and mobile devices. New York, New York, USA: ACM Press, Oct. 2011, p. 3.
-
(2011)
1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
8
-
-
84855853581
-
DroidDreamLight lurks behind legitimate Android apps
-
IEEE Computer Society, Oct.
-
M. Balanza, O. Abendan, K. Alintanahin, J. Dizon, and B. Caraig, "DroidDreamLight lurks behind legitimate Android apps," in 6th International Conference on Malicious and Unwanted Software. IEEE Computer Society, Oct. 2011, pp. 73-78.
-
(2011)
6th International Conference on Malicious and Unwanted Software
, pp. 73-78
-
-
Balanza, M.1
Abendan, O.2
Alintanahin, K.3
Dizon, J.4
Caraig, B.5
-
9
-
-
77954487766
-
Apex: Extending Android permission model and enforcement with user-defined runtime constraints
-
Beijing, China: ACM Press, Apr.
-
M. Nauman, S. Khan, and X. Zhang, "Apex: extending Android permission model and enforcement with user-defined runtime constraints," in 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM Press, Apr. 2010, pp. 328-332.
-
(2010)
5th ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
10
-
-
84856188819
-
YAASE: Yet Another Android Security Extension
-
MIT, USA: IEEE Computer Society, Oct.
-
G. Russello, B. Crispo, E. Fernandes, and Y. Zhauniarovich, "YAASE: Yet Another Android Security Extension," in Third IEEE International Conference on Information Privacy, Security, Risk and Trust. MIT, USA: IEEE Computer Society, Oct. 2011, pp. 1033-1040.
-
(2011)
Third IEEE International Conference on Information Privacy, Security, Risk and Trust
, pp. 1033-1040
-
-
Russello, G.1
Crispo, B.2
Fernandes, E.3
Zhauniarovich, Y.4
-
11
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, "Permission re-delegation: attacks and defenses," in 20th USENIX conference on Security, San Francisco, CA, USA, Aug. 2011, p. 22.
-
20th USENIX Conference on Security, San Francisco, CA, USA, Aug. 2011
, pp. 22
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
12
-
-
72349098599
-
Towards Formal Analysis of the Permission-Based Security Model for Android
-
Cannes/La Bocca, French Riviera, France: IEEE Computer Society
-
W. Shin, S. Kiyomoto, K. Fukushima, and T. Tanaka, "Towards Formal Analysis of the Permission-Based Security Model for Android," in Fifth International Conference on Wireless and Mobile Communications. Cannes/La Bocca, French Riviera, France: IEEE Computer Society, 2009, pp. 87-92.
-
(2009)
Fifth International Conference on Wireless and Mobile Communications
, pp. 87-92
-
-
Shin, W.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
13
-
-
78649293466
-
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework
-
Minneapolis, Minnesota, USA: IEEE Computer Society, Aug.
-
-, "A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework," in Second International Conference on Social Computing. Minneapolis, Minnesota, USA: IEEE Computer Society, Aug. 2010, pp. 944-951.
-
(2010)
Second International Conference on Social Computing
, pp. 944-951
-
-
Shin, W.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
14
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
Chicago, Illinois, USA: ACM Press, Oct.
-
A. Barrera, David and Kayacik, H. Güneş and van Oorschot, Paul C. and Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android," in 17th ACM conference on Computer and communications security. Chicago, Illinois, USA: ACM Press, Oct. 2010, pp. 73-84.
-
(2010)
17th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Barrera, A.1
David2
Kayacik3
Güneş, H.4
Van Oorschot, P.C.5
Somayaji6
-
15
-
-
80155126749
-
Various approaches in analyzing Android applications with its permission-based security models
-
Mankato, Minnesota, USA: IEEE Computer Society, May
-
I. Rassameeroj and Y. Tanahashi, "Various approaches in analyzing Android applications with its permission-based security models," in International Conference on Electro/Information Technology. Mankato, Minnesota, USA: IEEE Computer Society, May 2011, pp. 1-6.
-
(2011)
International Conference on Electro/Information Technology
, pp. 1-6
-
-
Rassameeroj, I.1
Tanahashi, Y.2
-
16
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones," in 9th USENIX conference on Operating systems design and implementation, Oct. 2010, pp. 1-6.
-
9th USENIX Conference on Operating Systems Design and Implementation, Oct. 2010
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
17
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
E. Bertino and R. S. Sandhu, Eds. San Antonio, TX, USA: ACM Press, Feb.
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "Detecting repackaged smartphone applications in third-party android marketplaces," in Second ACM conference on Data and Application Security and Privacy, E. Bertino and R. S. Sandhu, Eds. San Antonio, TX, USA: ACM Press, Feb. 2012, pp. 317-326.
-
(2012)
Second ACM Conference on Data and Application Security and Privacy
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
18
-
-
84870632086
-
-
Online. Available
-
Mila, "Contagio mobile," 2012. [Online]. Available: http://contagiominidump.blogspot.fr/
-
(2012)
Contagio Mobile
-
-
Mila1
-
19
-
-
84870636888
-
All data stored on your smartphone... gone in 60 seconds
-
Online. Available
-
L. Botezatu, "All data stored on your smartphone ..... gone in 60 seconds," MalwareCity, 2011. [Online]. Available: http://www.malwarecity. com/blog/all-data-stored-on-your-smartphone-gone-in-60-seconds-1156.html
-
(2011)
MalwareCity
-
-
Botezatu, L.1
-
20
-
-
84870647546
-
Android.Fakesucon
-
Online. Available
-
"Android.Fakesucon," Symantec Security Response's blog, 2011. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp? docid=2011-120915-2524-99
-
(2011)
Symantec Security Response's Blog
-
-
-
22
-
-
84870634878
-
-
Online. Available
-
Y. Li, "Android.Lovetrap," 2011. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2011-072806-2905-99
-
(2011)
Android.Lovetrap
-
-
Li, Y.1
-
23
-
-
84870647958
-
Server-side Polymorphic Android Applications
-
Online. Available
-
"Server-side Polymorphic Android Applications," Symantec Security Response's blog, 2012. [Online]. Available: http://www.symantec.com/ connect/blogs/server-side-polymorphic-android-applications
-
(2012)
Symantec Security Response's Blog
-
-
-
24
-
-
84870632513
-
Android Threat Tackles Piracy Using Austere Justice Measures
-
Online. Available
-
I. Asrar, "Android Threat Tackles Piracy Using Austere Justice Measures," Irfan Asrar's blog, 2011. [Online]. Available: http://www.symantec.com/connect/blogs/android-threat-tackles-piracy-using- austere-justice-measures
-
(2011)
Irfan Asrar's Blog
-
-
Asrar, I.1
|