-
1
-
-
84869761539
-
A new family of authentication protocols
-
Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., and Needham, R. A new family of authentication protocols. ACM SIGOPS Operating Systems Review 32, 4 (1998).
-
(1998)
ACM SIGOPS Operating Systems Review
, vol.32
, pp. 4
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.6
-
2
-
-
58049131394
-
Weak authentication: How to authenticate unknown principals without trusted parties
-
Arkko, J., and Nikander, P. Weak authentication: How to authenticate unknown principals without trusted parties. In Security Protocols (2002).
-
(2002)
Security Protocols
-
-
Arkko, J.1
Nikander, P.2
-
3
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
Barrera, D., Kayacik, G., van Oorschot, P., and Somayaji, A. A Methodology for Empirical Analysis of Permission-based Security Models and its Application to Android. In CCS (2010).
-
(2010)
CCS
-
-
Barrera, D.1
Kayacik, G.2
Van Oorschot, P.3
Somayaji, A.4
-
4
-
-
79957604407
-
Secure software installation on smartphones
-
Barrera, D., and van Oorschot, P. Secure software installation on smartphones. IEEE S&P Magazine 9, 3 (2011).
-
(2011)
IEEE S&P Magazine
, vol.9
, Issue.3
-
-
Barrera, D.1
Van Oorschot, P.2
-
5
-
-
80051969895
-
Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices
-
Becher, M., Freiling, F. C., Hoffmann, J., Holz, T., Uellenbeck, S., and Wolf, C. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In IEEE S&P Symposium (2011).
-
(2011)
IEEE S&P Symposium
-
-
Becher, M.1
Freiling, F.C.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
6
-
-
84866606313
-
Towards taming privilege-escalation attacks on Android
-
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A., and Shastry, B. Towards taming privilege-escalation attacks on Android. In NDSS (2012).
-
(2012)
NDSS
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.5
Shastry, B.6
-
7
-
-
84861302816
-
Is this app safe? A large scale study on application permissions and risk signals
-
Chia, P. H., Yamamoto, Y., and Asokan, N. Is this app safe? A large scale study on application permissions and risk signals. In WWW (2012).
-
(2012)
WWW
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
8
-
-
84869776039
-
Practical threshold RSA signatures without a trusted dealer
-
Damgard, I., and Koprowski, M. Practical threshold RSA signatures without a trusted dealer. In EUROCRYPT (2001).
-
(2001)
EUROCRYPT
-
-
Damgard, I.1
Koprowski, M.2
-
9
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., and Wallach, D. S. Quire: Lightweight provenance for smart phone operating systems. In USENIX Security (2011).
-
(2011)
USENIX Security
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
11
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
Egele, M., Kruegel, C., Kirda, E., and Vigna, G. PiOS: detecting privacy leaks in iOS applications. In NDSS (2011).
-
(2011)
NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
12
-
-
84869051195
-
Defending users against smartphone apps: Techniques and future directions
-
Enck, W. Defending users against smartphone apps: Techniques and future directions. In ICISS (2011).
-
(2011)
ICISS
-
-
Enck, W.1
-
13
-
-
79955570859
-
Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones. In OSDI (2010).
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
14
-
-
85025700509
-
A study of Android application security
-
Enck, W., Octeau, D., McDaniel, P., and Chaudhuri, S. A study of Android application security. In USENIX Security (2011).
-
(2011)
USENIX Security
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
15
-
-
74049155830
-
On lightweight mobile phone application certification
-
Enck, W., Ongtang, M., and McDaniel, P. On lightweight mobile phone application certification. In CCS (2009).
-
(2009)
CCS
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
17
-
-
80755187788
-
Android permissions demystified
-
Felt, A., Chin, E., Hanna, S., Song, D., and Wagner, D. Android permissions demystified. In CCS (2011).
-
(2011)
CCS
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
18
-
-
84864866297
-
A survey of mobile malware in the wild
-
Felt, A., Finifter, M., Chin, E., Hanna, S., and Wagner, D. A survey of mobile malware in the wild. In SPSM (2011).
-
(2011)
SPSM
-
-
Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
19
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
Felt, A. P., Wang, H. J., Moshchuk, A., Hanna, S., and Chin, E. Permission re-delegation: Attacks and defenses. In USENIX Security (2011).
-
(2011)
USENIX Security
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
20
-
-
0003880013
-
-
Addison-Wesley
-
Gamma, E., Helm, R., Johnson, R., and Vlisides, J. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlisides, J.4
-
21
-
-
84869804724
-
Split-and-delegate: Threshold cryptography for the masses
-
Geer Jr., D. E., and Yung, M. Split-and-delegate: Threshold cryptography for the masses. In FC (2002).
-
(2002)
FC
-
-
Geer Jr., D.E.1
Yung, M.2
-
22
-
-
84857808834
-
On message recognition protocols: Recoverability and explicit confirmation
-
Goldberg, I., Mashatan, A., and Stinson, D. On message recognition protocols: Recoverability and explicit confirmation. International Journal of Applied Cryptography 2, 2 (2010).
-
(2010)
International Journal of Applied Cryptography
, vol.2
, pp. 2
-
-
Goldberg, I.1
Mashatan, A.2
Stinson, D.3
-
23
-
-
84866625301
-
Systematic detection of capability leaks in stock android smartphones
-
Grace, M., Zhou, Y., Wang, Z., and Jiang, X. Systematic Detection of Capability Leaks in Stock Android Smartphones. In NDSS (2012).
-
(2012)
NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
24
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications
-
Hornyack, P., Han, S., Jung, J., Schechter, S., and Wetherall, D. These aren't the droids you're looking for: retrofitting Android to protect data from imperious applications. In CCS (2011).
-
(2011)
CCS
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
25
-
-
84869776042
-
Concrete security for entity recognition: The Jane Doe protocol
-
Lucks, S., Zenner, E., Weimerskirch, A., and Westhoff, D. Concrete security for entity recognition: The Jane Doe protocol. In INDOCRYPT (2008).
-
(2008)
INDOCRYPT
-
-
Lucks, S.1
Zenner, E.2
Weimerskirch, A.3
Westhoff, D.4
-
26
-
-
77950851532
-
Semantically rich application-centric security in android
-
Ongtang, M., McLaughlin, S., Enck, W., and McDaniel, P. Semantically rich application-centric security in android. In ACSAC (2009).
-
(2009)
ACSAC
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
27
-
-
78650002260
-
Survivable key compromise in software update systems
-
Samuel, J., Mathewson, N., Cappos, J., and Dingledine, R. Survivable key compromise in software update systems. In CCS (2010).
-
(2010)
CCS
-
-
Samuel, J.1
Mathewson, N.2
Cappos, J.3
Dingledine, R.4
-
28
-
-
0001000209
-
Practical threshold signatures
-
Shoup, V. Practical threshold signatures. In EUROCRYPT (2000).
-
(2000)
EUROCRYPT
-
-
Shoup, V.1
-
31
-
-
84869807687
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS (2012).
-
(2012)
NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|