메뉴 건너뛰기




Volumn , Issue , 2012, Pages 101-104

Leak miner: Detect information leakage on android with static taint analysis

Author keywords

Information security; Mobile computing

Indexed keywords

ANDROID APPLICATIONS; ANDROID APPS; ANDROID MARKETS; ANDROID PLATFORMS; DISTRIBUTION CENTERS; DYNAMIC APPROACHES; EVALUATION RESULTS; INFORMATION LEAKAGE; NEW APPROACHES; PERSONAL INFORMATION; RUNTIME OVERHEADS; SENSITIVE INFORMATIONS; SMS MESSAGES; STATE-OF-THE-ART APPROACH;

EID: 84873675066     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCSE.2012.26     Document Type: Conference Paper
Times cited : (176)

References (10)
  • 1
    • 84865574920 scopus 로고    scopus 로고
    • feb
    • Android and security, feb 2012. http://googlemobile.blogspot.com/2012/02/ android-andsecurity. html.
    • (2012) Android and Security
  • 2
    • 79961083020 scopus 로고    scopus 로고
    • Your apps are watching you. http://online.wsj.com/article/ SB10001424052748704694004576020083703574602.html.
    • Your Apps Are Watching You
  • 3
    • 84948958710 scopus 로고
    • Optimization of objectoriented programs using static class hierarchy analysis
    • J. Dean, D. Grove, and C. Chambers. Optimization of objectoriented programs using static class hierarchy analysis. In Proc. ECOOP'95, pages 77-101, 1995.
    • (1995) Proc. ECOOP'95 , pp. 77-101
    • Dean, J.1    Grove, D.2    Chambers, C.3
  • 5
    • 79955570859 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. OSDI'10, pages 1-6, 2010.
    • (2010) Proc. OSDI'10 , pp. 1-6
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 6
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
    • P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proc. CCS'11, pages 639-652, 2011.
    • (2011) Proc. CCS'11 , pp. 639-652
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.