-
1
-
-
0004072686
-
-
Pearson/Addison Wesley
-
Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: principles, techniques, and tools. Pearson/Addison Wesley (2007)
-
(2007)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Lam, M.S.2
Sethi, R.3
Ullman, J.D.4
-
5
-
-
78649990344
-
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
-
Barrera, D., Kayacik, H.G., van Oorshot, P.C., Somayaji, A.: A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android. In: Proceedings of the ACM Conference on Computer and Communications Security (2010)
-
Proceedings of the ACM Conference on Computer and Communications Security (2010)
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorshot, P.C.3
Somayaji, A.4
-
6
-
-
84860764042
-
MockDroid: Trading Privacy for Application Functionality on Smartphones
-
Beresford, A.R., Rice, A., Skehin, N., Sohan, R.: MockDroid: Trading Privacy for Application Functionality on Smartphones. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile (2011)
-
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile (2011)
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
8
-
-
81855220939
-
Defending Users against Smartphone Apps: Techniques and Future Directions
-
Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. Springer, Heidelberg
-
Enck, W.: Defending Users against Smartphone Apps: Techniques and Future Directions. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 49-70. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7093
, pp. 49-70
-
-
Enck, W.1
-
9
-
-
85076889619
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI (2010)
-
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI (2010)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
10
-
-
74049155830
-
On Lightweight Mobile Phone Application Certification
-
Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS (2009)
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS (2009)
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
11
-
-
80755187788
-
Android Permissions Demystified
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android Permissions Demystified. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
12
-
-
79955904273
-
-
(accessed March 14, 2012)
-
Fuchs, A.P., Chaudhuri, A., Foster, J.S.: ScanDroid: Automated Security Certification of Android Applications, http://www.cs.umd.edu/~avik/projects/ scandroidascaa/paper.pdf (accessed March 14, 2012)
-
ScanDroid: Automated Security Certification of Android Applications
-
-
Fuchs, A.P.1
Chaudhuri, A.2
Foster, J.S.3
-
14
-
-
24144440405
-
Information Flow Analysis for Java Bytecode
-
Cousot, R. (ed.) VMCAI 2005. Springer, Heidelberg
-
Genaim, S., Spoto, F.: Information Flow Analysis for Java Bytecode. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol. 3385, pp. 346-362. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3385
, pp. 346-362
-
-
Genaim, S.1
Spoto, F.2
-
15
-
-
84870684404
-
-
Google+ Post by Andy Rubin, https://plus.google.com/u/0/ 112599748506977857728/posts/Btey7rJBaLF
-
Google+ Post by Andy Rubin
-
-
-
16
-
-
80755187778
-
These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications
-
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
Proceedings of the ACM Conference on Computer and Communications Security, CCS (2011)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
17
-
-
84857945430
-
-
Tech. Rep. NAS-TR-0140-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA
-
Octeau, D., Enck, W., McDaniel, P.: The ded Decompiler. Tech. Rep. NAS-TR-0140-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (2010)
-
(2010)
The Ded Decompiler
-
-
Octeau, D.1
Enck, W.2
McDaniel, P.3
-
18
-
-
84882645608
-
Principles of secure information flow analysis
-
Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.) Springer, Heidelberg
-
Smith, G.: Principles of secure information flow analysis. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.) Malware Detection, pp. 291-307. Springer, Heidelberg (2007)
-
(2007)
Malware Detection
, pp. 291-307
-
-
Smith, G.1
-
19
-
-
84869597391
-
Android Market Analysis with Activation Patterns
-
Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds.) MobiSec 2011. Springer, Heidelberg
-
Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J., Prevenhueber, O.: Android Market Analysis with Activation Patterns. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds.) MobiSec 2011. LNICST, vol. 94, pp. 1-12. Springer, Heidelberg (2012)
-
(2012)
LNICST
, vol.94
, pp. 1-12
-
-
Teufl, P.1
Kraxberger, S.2
Orthacker, C.3
Lackner, G.4
Gissing, M.5
Marsalek, A.6
Leibetseder, J.7
Prevenhueber, O.8
-
20
-
-
0001956132
-
Soot - A Java optimization framework
-
Valle-Rai, R., Hendren, L., Sundaresan, V., Lam, P., Gagnon, E., Co, P.: Soot - a Java optimization framework. In: Proceedings of CASCON 1999 (1999)
-
Proceedings of CASCON 1999 (1999)
-
-
Valle-Rai, R.1
Hendren, L.2
Sundaresan, V.3
Lam, P.4
Gagnon, E.5
Co, P.6
-
21
-
-
85037359376
-
Taming Information-Stealing Smartphone Applications (on Android)
-
McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. Springer, Heidelberg
-
Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming Information-Stealing Smartphone Applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6740
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|