-
1
-
-
84870733476
-
-
"Android honeycomb encryption," http://source.android.com/tech/ encryption/android-crypto-implementation.html.
-
Android Honeycomb Encryption
-
-
-
2
-
-
84870755389
-
-
[Online]. Available: http://source.android.com/tech/security/index.html
-
"Android security overview," http://source.android.com/tech/ security/index.html. [Online]. Available: http://source.android.com/tech/ security/index.html
-
Android Security Overview
-
-
-
3
-
-
78149275323
-
-
[Online]. Available: http://www.boost.org
-
"Boost c++ library," http://www.boost.org/. [Online]. Available: http://www.boost.org/
-
Boost C++ Library
-
-
-
4
-
-
84870736257
-
-
[Online]. Available: http://en.wikipedia.org/wiki/ Dalvik-(software)
-
"Dalvik format," http://en.wikipedia.org/wiki/Dalvik-(software) . [Online]. Available: http://en.wikipedia.org/wiki/ Dalvik-(software)
-
Dalvik Format
-
-
-
5
-
-
84870762894
-
-
[Online]. Available: http://fuse.sourceforge.net
-
"File system in user space," http://fuse.sourceforge.net (2006). [Online]. Available: http://fuse.sourceforge.net
-
(2006)
File System in User Space
-
-
-
7
-
-
84870764192
-
-
"iozone," http://www.iozone.org/.
-
Iozone
-
-
-
8
-
-
84870730530
-
-
"Librlog," http://www.arg0.net/rlog.
-
Librlog
-
-
-
9
-
-
84870767647
-
-
"Nielsen report," http://blog.nielsen.com/nielsenwire/online- mobile/u-s-smartphone-market-whos-the-most-wanted/.
-
Nielsen Report
-
-
-
11
-
-
84870727726
-
-
"Rl benchmark: Sqlite," https://market.android.com/details?id= com.redlicense.benchmark.sqlite.
-
Rl Benchmark: Sqlite
-
-
-
12
-
-
84870750764
-
-
"Sqlite," http://www.sqlite.org/.
-
Sqlite
-
-
-
14
-
-
77951566629
-
Rootkits on smart phones: Attacks, implications and opportunities
-
New York, NY, USA: ACM
-
J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode, "Rootkits on smart phones: attacks, implications and opportunities," in HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems - Applications. New York, NY, USA: ACM, 2010, pp. 49-54.
-
(2010)
HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems - Applications
, pp. 49-54
-
-
Bickford, J.1
O'Hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
15
-
-
80051871355
-
Address space randomization for mobile devices
-
New York, NY, USA: ACM, [Online]. Available
-
H. Bojinov, D. Boneh, R. Cannings, and I. Malchev, "Address space randomization for mobile devices," in Proceedings of the fourth ACM conference on Wireless network security, ser. WiSec '11. New York, NY, USA: ACM, 2011, pp. 127-138. [Online]. Available: http://doi.acm.org/10.1145/1998412. 1998434
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security, Ser. WiSec '11
, pp. 127-138
-
-
Bojinov, H.1
Boneh, D.2
Cannings, R.3
Malchev, I.4
-
16
-
-
50249142448
-
Cloaker: Hardware supported rootkit concealment
-
Washington, DC, USA: IEEE Computer Society
-
F. M. David, E. M. Chan, J. C. Carlyle, and R. H. Campbell, "Cloaker: Hardware supported rootkit concealment," in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2008, pp. 296-310.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
David, F.M.1
Chan, E.M.2
Carlyle, J.C.3
Campbell, R.H.4
-
17
-
-
78650122777
-
A survey of confidential data storage and deletion methods
-
December [Online]. Available
-
S. M. Diesburg and A.-I. A. Wang, "A survey of confidential data storage and deletion methods," ACM Comput. Surv., vol. 43, pp. 2:1-2:37, December 2010. [Online]. Available: http://doi.acm.org/10.1145/1824795.1824797
-
(2010)
ACM Comput. Surv.
, vol.43
-
-
Diesburg, S.M.1
Wang, A.-I.A.2
-
18
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
New York, NY, USA: ACM
-
W. Enck, P. Gilbert, B. gon Chun, L. P. C. J. Jung, P. Mc- Daniel, and A. N. Sheth, "Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in OSDI '10: Proceedings of the 9th symposium on Operating systems design and implementation. New York, NY, USA: ACM, 2010, pp. 255-270.
-
(2010)
OSDI '10: Proceedings of the 9th Symposium on Operating Systems Design and Implementation
, pp. 255-270
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Jung, L.P.C.J.4
Mc-Daniel, P.5
Sheth, A.N.6
-
19
-
-
84870752871
-
Understanding android's security framework
-
New York, NY, USA: ACM, [Online]. Available
-
W. Enck and P. McDaniel, "Understanding android's security framework," in CCS '08: Proceedings of the 15th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2008, pp. 552-561. [Online]. Available: http://siis.cse.psu.edu/android sec tutorial.html
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Enck, W.1
McDaniel, P.2
-
20
-
-
79955951203
-
Keypad: An auditing file system for theft-prone devices
-
New York, NY, USA: ACM, [Online]. Available
-
R. Geambasu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy, "Keypad: an auditing file system for theft-prone devices," in Proceedings of the sixth conference on Computer systems, ser. EuroSys '11. New York, NY, USA: ACM, 2011, pp. 1-16. [Online]. Available: http://doi.acm.org/10. 1145/1966445.1966447
-
(2011)
Proceedings of the Sixth Conference on Computer Systems, Ser. EuroSys '11
, pp. 1-16
-
-
Geambasu, R.1
John, J.P.2
Gribble, S.D.3
Kohno, T.4
Levy, H.M.5
-
21
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
New York, NY, USA: ACM
-
H. Kim, J. Smith, and K. G. Shin, "Detecting energy-greedy anomalies and mobile malware variants," in MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2008, pp. 239-252.
-
(2008)
MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
22
-
-
81055139551
-
Examining storage performance on mobile devices
-
New York, NY, USA: ACM
-
H. Kim, N. Agrawal, and C. Ungureanu, "Examining storage performance on mobile devices," in Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds, ser. MobiHeld '11. New York, NY, USA: ACM, 2011, pp. 6:1-6:6.
-
(2011)
Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds, Ser. MobiHeld '11
-
-
Kim, H.1
Agrawal, N.2
Ungureanu, C.3
-
23
-
-
56749184065
-
Secure deletion for nand flash file system
-
New York, NY, USA: ACM, [Online]. Available
-
J. Lee, J. Heo, Y. Cho, J. Hong, and S. Y. Shin, "Secure deletion for nand flash file system," in Proceedings of the 2008 ACM symposium on Applied computing, ser. SAC '08. New York, NY, USA: ACM, 2008, pp. 1710-1714. [Online]. Available: http://doi.acm.org/10.1145/1363686.1364093
-
(2008)
Proceedings of the 2008 ACM Symposium on Applied Computing, Ser. SAC '08
, pp. 1710-1714
-
-
Lee, J.1
Heo, J.2
Cho, Y.3
Hong, J.4
Shin, S.Y.5
-
24
-
-
76649138917
-
Virusmeter: Preventing your cellphone from spies
-
Berlin, Heidelberg: Springer-Verlag
-
L. Liu, G. Yan, X. Zhang, and S. Chen, "Virusmeter: Preventing your cellphone from spies," in RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 244-264.
-
(2009)
RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
25
-
-
77951748635
-
Effects of wi-fi and bluetooth battery exhaustion attacks on mobile devices
-
Washington, DC, USA: IEEE Computer Society
-
B. R. Moyers, J. P. Dunning, R. C. Marchany, and J. G. Tront, "Effects of wi-fi and bluetooth battery exhaustion attacks on mobile devices," in HICSS '10: Proceedings of the 2010 43rd Hawaii International Conference on System Sciences. Washington, DC, USA: IEEE Computer Society, 2010, pp. 1-9.
-
(2010)
HICSS '10: Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
, pp. 1-9
-
-
Moyers, B.R.1
Dunning, J.P.2
Marchany, R.C.3
Tront, J.G.4
-
26
-
-
57349085063
-
Measuring integrity on mobile phone systems
-
New York, NY, USA: ACM
-
D. Muthukumaran, A. Sawani, J. Schiffman, B. M. Jung, and T. Jaeger, "Measuring integrity on mobile phone systems," in SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies. New York, NY, USA: ACM, 2008, pp. 155-164.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 155-164
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
27
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
Washington, DC, USA: IEEE Computer Society
-
D. C. Nash, T. L. Martin, D. S. Ha, and M. S. Hsiao, "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," in PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops. Washington, DC, USA: IEEE Computer Society, 2005, pp. 141-145.
-
(2005)
PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
28
-
-
77950851532
-
Semantically rich application-centric security in android
-
M. Ongtang, S. Mclaughlin, W. Enck, and P. Mcdaniel, "Semantically rich application-centric security in android," in In ACSAC '09: Annual Computer Security Applications Conference, 2009.
-
In ACSAC '09: Annual Computer Security Applications Conference, 2009
-
-
Ongtang, M.1
Mclaughlin, S.2
Enck, W.3
Mcdaniel, P.4
-
29
-
-
84870726529
-
Exploiting mms vulnerabilities to stealthily exhaust mobile phones battery
-
D. M. Radmilo Racic and H. Chen, "Exploiting mms vulnerabilities to stealthily exhaust mobile phones battery," in In SecureComm 06. SECURECOMM, 2006, pp. 1-10.
-
In SecureComm 06. SECURECOMM, 2006
, pp. 1-10
-
-
Radmilo Racic, D.M.1
Chen, H.2
-
30
-
-
77954746846
-
Performance and extension of user space file systems
-
New York, NY, USA: ACM, [Online]. Available
-
A. Rajgarhia and A. Gehani, "Performance and extension of user space file systems," in Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC '10. New York, NY, USA: ACM, 2010, pp. 206-213. [Online]. Available: http://doi.acm.org/10.1145/1774088.1774130
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing, Ser. SAC '10
, pp. 206-213
-
-
Rajgarhia, A.1
Gehani, A.2
-
31
-
-
35448967896
-
Benchmarks for mobile database access
-
New York, NY, USA: ACM
-
N. Tolia and M. Satyanarayanan, "Benchmarks for mobile database access," in Proceedings of the 1st international workshop on System evaluation for mobile platforms, ser. MobiEval '07. New York, NY, USA: ACM, 2007, pp. 47-47.
-
(2007)
Proceedings of the 1st International Workshop on System Evaluation for Mobile Platforms, Ser. MobiEval '07
, pp. 47-47
-
-
Tolia, N.1
Satyanarayanan, M.2
-
32
-
-
35448933695
-
Improving mobile database access over wide-area networks without degrading consistency
-
New York, NY, USA: ACM
-
N. Tolia, M. Satyanarayanan, and A. Wolbach, "Improving mobile database access over wide-area networks without degrading consistency," in Proceedings of the 5th international conference on Mobile systems, applications and services, ser. MobiSys '07. New York, NY, USA: ACM, 2007, pp. 71-84.
-
(2007)
Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, Ser. MobiSys '07
, pp. 71-84
-
-
Tolia, N.1
Satyanarayanan, M.2
Wolbach, A.3
-
33
-
-
78751488518
-
Exploiting smart-phone usb connectivity for fun and profit
-
New York, NY, USA: ACM, [Online]. Available
-
Z. Wang and A. Stavrou, "Exploiting smart-phone usb connectivity for fun and profit," in Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC '10. New York, NY, USA: ACM, 2010, pp. 357-366. [Online]. Available: http://doi.acm.org/10.1145/1920261.1920314
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, Ser. ACSAC '10
, pp. 357-366
-
-
Wang, Z.1
Stavrou, A.2
|