-
2
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to Android
-
New York, NY, USA. ACM
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 73-84, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
3
-
-
80755167433
-
XManDroid: A new Android evolution to mitigate privilege escalation attacks
-
April
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. XManDroid: A new Android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Universität Darmstadt, April 2011.
-
(2011)
Technical Report TR-2011-04, Technische Universität Darmstadt
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
4
-
-
84888341014
-
Towards taming privilege-escalation attacks on Android
-
February
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on Android. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
6
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
Berlin, Heidelberg. Springer-Verlag
-
L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for malware analysis and containment. In Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pages 143-163, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
7
-
-
70450260685
-
Language-based security on Android
-
New York, NY, USA. ACM
-
A. Chaudhuri. Language-based security on Android. In Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pages 1-7, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09
, pp. 1-7
-
-
Chaudhuri, A.1
-
8
-
-
85037073388
-
Privilege escalation attacks on Android
-
Berlin, Heidelberg. Springer-Verlag
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy. Privilege escalation attacks on Android. In Proceedings of the 13th International Conference on Information Security, ISC'10, pages 346-360, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 13th International Conference on Information Security, ISC'10
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
10
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA. USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
11
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA. ACM
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 235-245, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
13
-
-
84872106230
-
A guide to understanding covert channel analysis of trusted systems, version 1 (light pink book)
-
November. National Computer Security Center, TCSEC Rainbow Series Library
-
V. Gligor. A guide to understanding covert channel analysis of trusted systems, version 1 (light pink book). NCSC-TG-030, Library No. S-240,572, November 1993. National Computer Security Center, TCSEC Rainbow Series Library.
-
(1993)
NCSC-TG-030, Library No. S-240
, vol.572
-
-
Gligor, V.1
-
14
-
-
84872118765
-
-
Google. Android OS (up to version 2.3.7)
-
Google. Android OS (up to version 2.3.7). http://developer.android.com/.
-
-
-
-
15
-
-
84872112519
-
-
GRSecurity
-
GRSecurity. The GRSecurity project. http://grsecurity.net/features.php.
-
-
-
-
16
-
-
80455150777
-
Task oriented management obviates your onus on linux (TOMOYO Linux)
-
T. Harada, T. Horie, and K. Tanaka. Task oriented management obviates your onus on linux (TOMOYO Linux). Linux Conference, 2004.
-
(2004)
Linux Conference
-
-
Harada, T.1
Horie, T.2
Tanaka, K.3
-
18
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, Oct. 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
20
-
-
84945721946
-
A comment on the confinement problem
-
New York, NY, USA. ACM
-
S. B. Lipner. A comment on the confinement problem. In Proceedings of the 5th ACM Symposium on Operating Systems Principles, SOSP '75, pages 192-196, New York, NY, USA, 1975. ACM.
-
(1975)
Proceedings of the 5th ACM Symposium on Operating Systems Principles, SOSP '75
, pp. 192-196
-
-
Lipner, S.B.1
-
21
-
-
84872117439
-
-
accessed October 2012
-
Microsoft. Security for Windows Phone 7. http://msdn.microsoft.com/enus/ library/ff402533%28v=VS.92%29.aspx (accessed October 2012).
-
Security for Windows Phone 7
-
-
-
22
-
-
39149090024
-
A virtual machine based information flow control system for policy enforcement
-
DOI 10.1016/j.entcs.2007.10.010, PII S1571066108000455
-
S. K. Nair, P. N. D. Simpson, B. Crispo, and A. S. Tanenbaum. A virtual machine based information flow control system for policy enforcement. Electron. Notes Theor. Comput. Sci., 197(1):3-16, Feb. 2008. (Pubitemid 351253789)
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 3-16
-
-
Nair, S.K.1
Simpson, P.N.D.2
Crispo, B.3
Tanenbaum, A.S.4
-
23
-
-
84872120166
-
-
Nokia. Symbian OS. http://symbian.nokia.com.
-
-
-
-
24
-
-
84872109592
-
-
June (accessed October 2012)
-
J. Oberheide. Android Hax. SummerCon 2010, June 2010. http://jon.oberheide.org/files/summercon10- androidhax-jonoberheide.pdf (accessed October 2012).
-
(2010)
Android Hax. SummerCon 2010
-
-
-
25
-
-
77951558980
-
When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments
-
New York, NY, USA, ACM
-
J. Oberheide and F. Jahanian. When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments. In Proceedings of the 11th Workshop on Mobile Computing Systems and Applications, HotMobile '10, pages 43-48, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 11th Workshop on Mobile Computing Systems and Applications, HotMobile '10
, pp. 43-48
-
-
Oberheide, J.1
Jahanian, F.2
-
26
-
-
77950851532
-
Semantically rich application-centric security in Android
-
dec.
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in Android. In Proceedings of the 25th Annual Computer Security Applications Conference, ACSAC '09, pages 340 -349, dec. 2009.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference, ACSAC '09
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
27
-
-
0032680807
-
Information hiding-A survey
-
July
-
F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062-1078, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.1
Anderson, R.J.2
Kuhn, M.G.3
-
28
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
New York, NY, USA, ACM
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 347-356, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
29
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound Trojan for Smartphones
-
Feb.
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11, pages 17-33, Feb. 2011.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
30
-
-
57349196370
-
A security domain model to assess software for exploitable covert channels
-
New York, NY, USA. ACM
-
A. B. Shaffer, M. Auguston, C. E. Irvine, and T. E. Levin. A security domain model to assess software for exploitable covert channels. In Proceedings of the 3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '08, pages 45-56, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '08
, pp. 45-56
-
-
Shaffer, A.B.1
Auguston, M.2
Irvine, C.E.3
Levin, T.E.4
-
32
-
-
84872112209
-
-
accessed October 2012
-
The Lookout Blog. Lookout's privacy advisor protects your private information. http://blog.mylookout.com/2010/11/lookout%E2%80%99s-privacy- advisorprotects-your-private-information/ (accessed October 2012).
-
Lookout's Privacy Advisor Protects Your Private Information
-
-
-
33
-
-
80052533055
-
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
-
New York, NY, USA, ACM
-
M. Tiwari, J. K. Oberg, X. Li, J. Valamehr, T. Levin, B. Hardekopf, R. Kastner, F. T. Chong, and T. Sherwood. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security. In Proceedings of the 38th Annual International Symposium on Computer Architecture, ISCA '11, pages 189-200, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 38th Annual International Symposium on Computer Architecture, ISCA '11
, pp. 189-200
-
-
Tiwari, M.1
Oberg, J.K.2
Li, X.3
Valamehr, J.4
Levin, T.5
Hardekopf, B.6
Kastner, R.7
Chong, F.T.8
Sherwood, T.9
-
35
-
-
78650733675
-
Threat analysis of the Android market
-
June. Smobile systems technical report, accessed October 2012
-
T. Vennon and D. Stroop. Threat analysis of the Android market. Technical report, GTC, June 2010. Smobile systems technical report, Available at http://threatcenter.smobilesystems.com/wpcontent/uploads/2010/06/ Android-Market-Threat-Analysis-6-22-10-v1.pdf (accessed October 2012).
-
(2010)
Technical Report, GTC
-
-
Vennon, T.1
Stroop, D.2
-
36
-
-
34547331261
-
Covert and side channels due to processor architecture
-
DOI 10.1109/ACSAC.2006.20, 4041191, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
Z. Wang and R. B. Lee. Covert and side channels due to processor architecture. In Proceedings of the 22nd Annual Computer Security Applications Conference, ACSAC '06, pages 473 -482, dec. 2006. (Pubitemid 351232939)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 473-482
-
-
Wang, Z.1
Lee, R.B.2
|