-
1
-
-
84870656816
-
-
Android market growth. http://android-developers.blogspot.com/2011/12/ closer-look-at-10-billion-downloads.html.
-
-
-
-
2
-
-
84870710318
-
-
Android snapshot. http://pastebin.com/bCieGJVV.
-
-
-
-
3
-
-
84870702146
-
-
Antiy corp. ltd. http://www.antiy.com/cn/about/index.htm.
-
-
-
-
4
-
-
84870701427
-
-
Apktool. http://code.google.com/p/android-apktool/.
-
-
-
-
5
-
-
84870655176
-
-
Bouncer. http://googlemobile.blogspot.com/2012/02/android-and-security. html.
-
-
-
-
6
-
-
84870688659
-
-
Contagio. http://contagiominidump.blogspot.co.il/search/label/Russian.
-
-
-
-
7
-
-
84870697061
-
-
The horoscope app. https://play.google.com/store/apps/details?id=fr. telemaque.horoscope.
-
-
-
-
8
-
-
84870664270
-
-
Introducing google play. http://googleblog.blogspot.com/2012/03/ introducing-google-play-all-your.html.
-
-
-
-
9
-
-
84870703356
-
-
Jni. http://developer.android.com/guide/practices/jni.html.
-
-
-
-
10
-
-
84870694336
-
-
Operaupdater. http://www.18digi.com/news/7361/tencent-security- laboratory,-december-11-mobile-phone-viruses/.
-
-
-
-
11
-
-
84870658045
-
-
Sensitive apis. http://www.android-permissions.org/.
-
-
-
-
13
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
New York, NY, USA, ACM
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 15-26, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
14
-
-
84860696959
-
Droidchecker: Analyzing android applications for capability leak
-
New York, NY, USA, ACM
-
P. P. Chan, L. C. Hui, and S. M. Yiu. Droidchecker: analyzing android applications for capability leak. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pages 125-136, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12
, pp. 125-136
-
-
Chan, P.P.1
Hui, L.C.2
Yiu, S.M.3
-
15
-
-
79961035117
-
Analyzing inter-application communication in android
-
New York, NY, USA, ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pages 239-252, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
16
-
-
84869819325
-
-
Technical report, Department of Computer Science, University of Leipzig, Germany, May. Technical Note
-
S. Dienst and T. Berger. Mining interactions of android applications static analysis of dalvik bytecode. Technical report, Department of Computer Science, University of Leipzig, Germany, May 2011. Technical Note.
-
(2011)
Mining Interactions of Android Applications Static Analysis of Dalvik Bytecode
-
-
Dienst, S.1
Berger, T.2
-
17
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA, USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
18
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA, USENIX Association
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21-21, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
19
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA, ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 627-638, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
20
-
-
80755181021
-
A survey of mobile malware in the wild
-
New York, NY, USA, ACM
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 3-14, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
21
-
-
84863084209
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
Vienna, Austria
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale. In Proceedings of the 5th International Conference on Trust & Trustworthy Computing, TRUST '12, pages 291-307, Vienna, Austria, 2012.
-
(2012)
Proceedings of the 5th International Conference on Trust & Trustworthy Computing, TRUST '12
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
22
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
New York, NY, USA, ACM
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung. Vision: automated security validation of mobile apps at app markets. In Proceedings of the second international workshop on Mobile cloud computing and services, MCS '11, pages 21-26, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Second International Workshop on Mobile Cloud Computing and Services, MCS '11
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
23
-
-
79959449597
-
Automating gui testing for android applications
-
New York, NY, USA, ACM
-
C. Hu and I. Neamtiu. Automating gui testing for android applications. In Proceedings of the 6th International Workshop on Automation of Software Test, AST '11, pages 77-83, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 6th International Workshop on Automation of Software Test, AST '11
, pp. 77-83
-
-
Hu, C.1
Neamtiu, I.2
-
24
-
-
79955565381
-
Pios: Detecting privacy leaks in ios applications
-
E. Manuel, K. Christopher, K. Engin, and V. Giovanni. Pios: Detecting privacy leaks in ios applications. In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '11, 2011.
-
(2011)
Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '11
-
-
Manuel, E.1
Christopher, K.2
Engin, K.3
Giovanni, V.4
-
25
-
-
84869803280
-
Systematic detection of capability leaks in stock android smartphones
-
G. Michael, Z. Yajin, W. Zhi, and J. Xuxian. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '12, 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '12
-
-
Michael, G.1
Yajin, Z.2
Zhi, W.3
Xuxian, J.4
-
26
-
-
70350448477
-
Control-flow analysis of function calls and returns by abstract interpretation
-
New York, NY, USA, ACM
-
J. Midtgaard and T. P. Jensen. Control-flow analysis of function calls and returns by abstract interpretation. In Proceedings of the 14th ACM SIGPLAN international conference on Functional programming, ICFP '09, pages 287-298, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 14th ACM SIGPLAN International Conference on Functional Programming, ICFP '09
, pp. 287-298
-
-
Midtgaard, J.1
Jensen, T.P.2
-
27
-
-
84871278310
-
Automated concolic testing of smartphone apps
-
March
-
A. Saswat, N. Mayur, Y. Hongseok, and J. H. Mary. Automated concolic testing of smartphone apps. In Proceedings of the ACM Symposium on Foundations of Software Engineering, FSE '12, March 2012.
-
(2012)
Proceedings of the ACM Symposium on Foundations of Software Engineering, FSE '12
-
-
Saswat, A.1
Mayur, N.2
Hongseok, Y.3
Mary, J.H.4
-
28
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
Feb.
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss. "andromaly": a behavioral malware detection framework for android devices. J. Intell. Inf. Syst., 38(1):161-190, Feb. 2012.
-
(2012)
J. Intell. Inf. Syst.
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
29
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
B. Thomas, B. Leonid, S. Aubrey-Derrick, and A. C. Seyit. An android application sandbox system for suspicious software detection. In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, Malware '10, pages 55-62, 2012.
-
(2012)
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference On, Malware '10
, pp. 55-62
-
-
Thomas, B.1
Leonid, B.2
Aubrey-Derrick, S.3
Seyit, A.C.4
-
30
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
X. J. Yajin Zhou. Dissecting android malware: Characterization and evolution. Security and Privacy, IEEE Symposium on, 0:95-109, 2012.
-
(2012)
Security and Privacy, IEEE Symposium on
, vol.0
, pp. 95-109
-
-
Yajin Zhou, X.J.1
-
31
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
New York, NY, USA, ACM
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASPY '12, pages 317-326, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY '12
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|