메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3-14

Dr. android and Mr. hide: Fine-grained permissions in android applications

Author keywords

Android; Binary transformation; Fine grained permissions

Indexed keywords

ANDROID; BINARY TRANSFORMATION; FINE-GRAINED PERMISSIONS;

EID: 84869790502     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2381934.2381938     Document Type: Conference Paper
Times cited : (177)

References (32)
  • 3
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In CCS, pages 73-84, 2010.
    • (2010) CCS , pp. 73-84
    • Barrera, D.1    Kayacik, H.2    Van Oorschot, P.3    Somayaji, A.4
  • 4
    • 84860764042 scopus 로고    scopus 로고
    • MockDroid: Trading privacy for application functionality on smartphones
    • A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. MockDroid: trading privacy for application functionality on smartphones. In HotMobile, 2011.
    • (2011) HotMobile
    • Beresford, A.R.1    Rice, A.2    Skehin, N.3    Sohan, R.4
  • 8
    • 79961035117 scopus 로고    scopus 로고
    • Analyzing inter-application communication in android
    • E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing Inter-Application Communication in Android. In MobiSys, 2011.
    • (2011) MobiSys
    • Chin, E.1    Felt, A.P.2    Greenwood, K.3    Wagner, D.4
  • 11
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-ow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-ow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 13
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In CCS, pages 235-245, 2009.
    • (2009) CCS , pp. 235-245
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 18
    • 84870673591 scopus 로고    scopus 로고
    • Dec
    • Google. 10 Billion Android Market Downloads and Counting, Dec. 2011. http://android-developers.blogspot.com/2011/12/10-billion-android-market- downloads-and.html.
    • (2011)
  • 19
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS, 2012.
    • (2012) NDSS
    • Grace, M.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 20
    • 85165758676 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock android smartphones
    • M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In NDSS, 2012.
    • (2012) NDSS
    • Grace, M.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 21
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
    • P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In CCS, pages 639-652, 2011.
    • (2011) CCS , pp. 639-652
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 23
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In ASIACCS, pages 328-332, 2010.
    • (2010) ASIACCS , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 25
    • 77950851532 scopus 로고    scopus 로고
    • Semantically rich application-centric security in android
    • M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in android. In ACSAC, pages 340-349, 2009.
    • (2009) ACSAC , pp. 340-349
    • Ongtang, M.1    McLaughlin, S.2    Enck, W.3    McDaniel, P.4
  • 29
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in Multics
    • July
    • J. H. Saltzer. Protection and the control of information sharing in Multics. Comm. of the ACM, 17(7):388-402, July 1974.
    • (1974) Comm. of the ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.H.1
  • 31
    • 85060493868 scopus 로고    scopus 로고
    • DroidScope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis
    • L. K. Yan and H. Yin. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Proceedings of the 21st USENIX Security Symposium, 2012.
    • (2012) Proceedings of the 21st USENIX Security Symposium
    • Yan, L.K.1    Yin, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.