-
1
-
-
84860764042
-
Mockdroid: Trading privacy for application functionality on smartphones
-
New York, NY, USA, ACM
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. Mockdroid: trading privacy for application functionality on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, pages 49-54, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
2
-
-
35448979944
-
Smartsiren: Virus detection and alert for smartphones
-
New York, NY, USA,. ACM
-
J. Cheng, S. H. Wong, H. Yang, and S. Lu. Smartsiren: virus detection and alert for smartphones. In Proceedings of the 5th international conference on Mobile systems, applications and services, MobiSys '07, pages 258-271, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, MobiSys '07
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
3
-
-
84870663486
-
-
Retrieved in Aug
-
CyanogenMod. http://www.cyanogenmod.com/, Retrieved in Aug 2012.
-
(2012)
-
-
-
4
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA, USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
5
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA, USENIX Association
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21-21, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
6
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA, ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 627-638, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
7
-
-
84870700469
-
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Stowaway: A static analysis tool and permission map for identifying permission use in android applications. http://www.android-permissions.org/, 2011.
-
(2011)
Stowaway: A Static Analysis Tool and Permission Map for Identifying Permission Use in Android Applications
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
8
-
-
80755172898
-
The effectiveness of application permissions
-
Berkeley, CA, USA, USENIX Association
-
A. P. Felt, K. Greenwood, and D. Wagner. The effectiveness of application permissions. In Proceedings of the 2nd USENIX conference on Web application development, WebApps'11, pages 7-7, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps'11
, pp. 7-7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
9
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
New York, NY, USA, ACM
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pages 3:1-3:14, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12
, pp. 31-314
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
11
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
New York, NY, USA, ACM
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 639-652, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
12
-
-
84867438639
-
A conundrum of permissions: Installing applications on an Android smartphone
-
Feb
-
P. Kelley, S. Consolvo, L. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A conundrum of permissions: Installing applications on an Android smartphone. In Proceedings of the Workshop on Usable Security (USEC), Feb. 2012.
-
(2012)
Proceedings of the Workshop on Usable Security (USEC)
-
-
Kelley, P.1
Consolvo, S.2
Cranor, L.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
14
-
-
84867459428
-
Expecation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing
-
Sep
-
J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expecation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the 14th ACM International Conference on Ubiquitous Computing, Sep 2012.
-
(2012)
Proceedings of the 14th ACM International Conference on Ubiquitous Computing
-
-
Lin, J.1
Amini, S.2
Hong, J.I.3
Sadeh, N.4
Lindqvist, J.5
Zhang, J.6
-
15
-
-
85180635118
-
Software self-healing using collaborative application communities
-
San Diego, California, USA. The Internet Society
-
M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. Software self-healing using collaborative application communities. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA. The Internet Society, 2006.
-
(2006)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2006
-
-
Locasto, M.E.1
Sidiroglou, S.2
Keromytis, A.D.3
-
16
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
New York, NY, USA, ACM
-
M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pages 328-332, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
17
-
-
34547367533
-
Doppelganger: Better browser privacy without the bother
-
New York, NY, USA, ACM
-
U. Shankar and C. Karlof. Doppelganger: Better browser privacy without the bother. In Proceedings of the 13th ACM conference on Computer and communications security, CCS '06, pages 154-167, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06
, pp. 154-167
-
-
Shankar, U.1
Karlof, C.2
-
18
-
-
84860750391
-
Smsassassin: Crowdsourcing driven mobile-based system for sms spam filtering
-
K. Yadav, P. Kumaraguru, A. Goyal, A. Gupta, and V. Naik. Smsassassin: Crowdsourcing driven mobile-based system for sms spam filtering. In Proceedings of the 12th Workshop on Mobile Computing Systems & Applications, HotMobile '11. ACM, 2011.
-
(2011)
Proceedings of the 12th Workshop on Mobile Computing Systems & Applications, HotMobile '11. ACM
-
-
Yadav, K.1
Kumaraguru, P.2
Goyal, A.3
Gupta, A.4
Naik, V.5
|