-
2
-
-
84870674349
-
-
Emails Addresses, Much More, Oct
-
Android Police. Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More, Oct. 2011. http://www.androidpolice.com/2011/10/01/ massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt- others-exposes-phone-numbers-gps-sms-emails-addresses-much-more.
-
(2011)
Massive Security Vulnerability in HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS
-
-
-
3
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In CCS, pages 73-84, 2010.
-
(2010)
CCS
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.2
Van Oorschot, P.3
Somayaji, A.4
-
4
-
-
84860764042
-
MockDroid: Trading privacy for application functionality on smartphones
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. MockDroid: trading privacy for application functionality on smartphones. In HotMobile, 2011.
-
(2011)
HotMobile
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
5
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
Feb
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In 19th Annual Network & Distributed System Security Symposium (NDSS), Feb 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
6
-
-
80755127062
-
Practical and lightweight domain isolation on android
-
S. Bugiel, L. Davi, A. Dmitrienko, and S. Heuser. Practical and lightweight domain isolation on android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Heuser, S.4
-
7
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 15-26, 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
10
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
11
-
-
79955570859
-
TaintDroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-ow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
13
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In CCS, pages 235-245, 2009.
-
(2009)
CCS
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
14
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. Felt, H. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Felt, A.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
15
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In CCS, 2011.
-
(2011)
CCS
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
18
-
-
84870673591
-
-
Dec
-
Google. 10 Billion Android Market Downloads and Counting, Dec. 2011. http://android-developers.blogspot.com/2011/12/10-billion-android-market- downloads-and.html.
-
(2011)
-
-
-
19
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS, 2012.
-
(2012)
NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
20
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In NDSS, 2012.
-
(2012)
NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
21
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In CCS, pages 639-652, 2011.
-
(2011)
CCS
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
22
-
-
84869811164
-
-
Technical Report CS-TR-5006, Department of Computer Science, University of Maryland, College Park, December
-
J. Jeon, K. K. Micinski, J. A. Vaughan, N. Reddy, Y. Zhu, J. S. Foster, and T. Millstein. Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android. Technical Report CS-TR-5006, Department of Computer Science, University of Maryland, College Park, December 2011.
-
(2011)
Dr. Android and Mr. Hide: Fine-grained Security Policies on Unmodified Android
-
-
Jeon, J.1
Micinski, K.K.2
Vaughan, J.A.3
Reddy, N.4
Zhu, Y.5
Foster, J.S.6
Millstein, T.7
-
23
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In ASIACCS, pages 328-332, 2010.
-
(2010)
ASIACCS
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
24
-
-
78751555807
-
Porscha: Policy oriented secure content handling in android
-
M. Ongtang, K. Butler, and P. McDaniel. Porscha: policy oriented secure content handling in android. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 221-230, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 221-230
-
-
Ongtang, M.1
Butler, K.2
McDaniel, P.3
-
25
-
-
77950851532
-
Semantically rich application-centric security in android
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in android. In ACSAC, pages 340-349, 2009.
-
(2009)
ACSAC
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
26
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
P. Pearce, A. P. Felt, G. Nunez, , and D. Wagner. Addroid: Privilege separation for applications and advertisers in android. In ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2012.
-
(2012)
ACM Symposium on Information, Computer and Communications Security (AsiaCCS)
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
27
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 347-356, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
29
-
-
0016081584
-
Protection and the control of information sharing in Multics
-
July
-
J. H. Saltzer. Protection and the control of information sharing in Multics. Comm. of the ACM, 17(7):388-402, July 1974.
-
(1974)
Comm. of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
31
-
-
85060493868
-
DroidScope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis
-
L. K. Yan and H. Yin. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Proceedings of the 21st USENIX Security Symposium, 2012.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
-
-
Yan, L.K.1
Yin, H.2
-
32
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. Freeh. Taming information-stealing smartphone applications (on android). Trust and Trustworthy Computing, pages 93-107, 2011.
-
(2011)
Trust and Trustworthy Computing
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
|