메뉴 건너뛰기




Volumn , Issue , 2012, Pages 81-92

Understanding and improving app installation security mechanisms through empirical analysis of android

Author keywords

Android; Digital signatures; Software installation

Indexed keywords

ANDROID; DATA SETS; EMPIRICAL ANALYSIS; EMPIRICAL EVIDENCE; MITIGATION OPTIONS; SECURE DATA TRANSFER; SECURITY MECHANISM; SECURITY PRACTICE; SOFTWARE INSTALLATIONS;

EID: 84869797921     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2381934.2381949     Document Type: Conference Paper
Times cited : (38)

References (31)
  • 2
    • 58049131394 scopus 로고    scopus 로고
    • Weak authentication: How to authenticate unknown principals without trusted parties
    • Arkko, J., and Nikander, P. Weak authentication: How to authenticate unknown principals without trusted parties. In Security Protocols (2002).
    • (2002) Security Protocols
    • Arkko, J.1    Nikander, P.2
  • 3
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • Barrera, D., Kayacik, G., van Oorschot, P., and Somayaji, A. A Methodology for Empirical Analysis of Permission-based Security Models and its Application to Android. In CCS (2010).
    • (2010) CCS
    • Barrera, D.1    Kayacik, G.2    Van Oorschot, P.3    Somayaji, A.4
  • 4
    • 79957604407 scopus 로고    scopus 로고
    • Secure software installation on smartphones
    • Barrera, D., and van Oorschot, P. Secure software installation on smartphones. IEEE S&P Magazine 9, 3 (2011).
    • (2011) IEEE S&P Magazine , vol.9 , Issue.3
    • Barrera, D.1    Van Oorschot, P.2
  • 7
    • 84861302816 scopus 로고    scopus 로고
    • Is this app safe? A large scale study on application permissions and risk signals
    • Chia, P. H., Yamamoto, Y., and Asokan, N. Is this app safe? A large scale study on application permissions and risk signals. In WWW (2012).
    • (2012) WWW
    • Chia, P.H.1    Yamamoto, Y.2    Asokan, N.3
  • 8
    • 84869776039 scopus 로고    scopus 로고
    • Practical threshold RSA signatures without a trusted dealer
    • Damgard, I., and Koprowski, M. Practical threshold RSA signatures without a trusted dealer. In EUROCRYPT (2001).
    • (2001) EUROCRYPT
    • Damgard, I.1    Koprowski, M.2
  • 11
    • 84888331381 scopus 로고    scopus 로고
    • PiOS: Detecting privacy leaks in iOS applications
    • Egele, M., Kruegel, C., Kirda, E., and Vigna, G. PiOS: detecting privacy leaks in iOS applications. In NDSS (2011).
    • (2011) NDSS
    • Egele, M.1    Kruegel, C.2    Kirda, E.3    Vigna, G.4
  • 12
    • 84869051195 scopus 로고    scopus 로고
    • Defending users against smartphone apps: Techniques and future directions
    • Enck, W. Defending users against smartphone apps: Techniques and future directions. In ICISS (2011).
    • (2011) ICISS
    • Enck, W.1
  • 13
    • 79955570859 scopus 로고    scopus 로고
    • Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones
    • Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones. In OSDI (2010).
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 15
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • Enck, W., Ongtang, M., and McDaniel, P. On lightweight mobile phone application certification. In CCS (2009).
    • (2009) CCS
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 21
    • 84869804724 scopus 로고    scopus 로고
    • Split-and-delegate: Threshold cryptography for the masses
    • Geer Jr., D. E., and Yung, M. Split-and-delegate: Threshold cryptography for the masses. In FC (2002).
    • (2002) FC
    • Geer Jr., D.E.1    Yung, M.2
  • 23
    • 84866625301 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock android smartphones
    • Grace, M., Zhou, Y., Wang, Z., and Jiang, X. Systematic Detection of Capability Leaks in Stock Android Smartphones. In NDSS (2012).
    • (2012) NDSS
    • Grace, M.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 24
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications
    • Hornyack, P., Han, S., Jung, J., Schechter, S., and Wetherall, D. These aren't the droids you're looking for: retrofitting Android to protect data from imperious applications. In CCS (2011).
    • (2011) CCS
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 25
    • 84869776042 scopus 로고    scopus 로고
    • Concrete security for entity recognition: The Jane Doe protocol
    • Lucks, S., Zenner, E., Weimerskirch, A., and Westhoff, D. Concrete security for entity recognition: The Jane Doe protocol. In INDOCRYPT (2008).
    • (2008) INDOCRYPT
    • Lucks, S.1    Zenner, E.2    Weimerskirch, A.3    Westhoff, D.4
  • 26
    • 77950851532 scopus 로고    scopus 로고
    • Semantically rich application-centric security in android
    • Ongtang, M., McLaughlin, S., Enck, W., and McDaniel, P. Semantically rich application-centric security in android. In ACSAC (2009).
    • (2009) ACSAC
    • Ongtang, M.1    McLaughlin, S.2    Enck, W.3    McDaniel, P.4
  • 27
    • 78650002260 scopus 로고    scopus 로고
    • Survivable key compromise in software update systems
    • Samuel, J., Mathewson, N., Cappos, J., and Dingledine, R. Survivable key compromise in software update systems. In CCS (2010).
    • (2010) CCS
    • Samuel, J.1    Mathewson, N.2    Cappos, J.3    Dingledine, R.4
  • 28
    • 0001000209 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Shoup, V. Practical threshold signatures. In EUROCRYPT (2000).
    • (2000) EUROCRYPT
    • Shoup, V.1
  • 31
    • 84869807687 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS (2012).
    • (2012) NDSS
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.