-
1
-
-
84893332856
-
-
Virustotal. http://www.virustotal.com.
-
Virustotal
-
-
-
4
-
-
84874835994
-
-
Oct.
-
Android developer guide 4.0 r1. http://developer.android.com/guide/ topics/manifest/manifest-element.html Oct. 2011.
-
(2011)
Android Developer Guide 4.0 R1
-
-
-
11
-
-
80051969895
-
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
-
IEEE
-
BECHER, M., FREILING, F., HOFFMANN, J., HOLZ, T., UELLENBECK, S., AND WOLF, C. Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In Proc. IEEE Symp. on Security and Privacy (2011), IEEE, pp. 96-111.
-
Proc. IEEE Symp. on Security and Privacy (2011)
, pp. 96-111
-
-
Becher, M.1
Freiling, F.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
12
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
ACM
-
BURGUERA, I., ZURUTUZA, U., AND NADJM-TEHRANI, S. Crowdroid: behavior-based malware detection system for android. In Proc. ACM work. Security and privacy in smartphones and mobile devices (2011), ACM, pp. 15-26.
-
Proc. ACM Work. Security and Privacy in Smartphones and Mobile Devices (2011)
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-tehrani, S.3
-
13
-
-
80755144024
-
App isolation: Get the security of multiple browsers with just one
-
ACM
-
CHEN, E., BAU, J., REIS, C., BARTH, A., AND JACKSON, C. App isolation: get the security of multiple browsers with just one. In Proc. ACM CCS (2011), ACM, pp. 227-238.
-
(2011)
Proc. ACM CCS
, pp. 227-238
-
-
Chen, E.1
Bau, J.2
Reis, C.3
Barth, A.4
Jackson, C.5
-
14
-
-
35448979944
-
Smartsiren: Virus detection and alert for smartphones
-
CHENG, J., WONG, S., YANG, H., AND LU, S. Smartsiren: virus detection and alert for smartphones. In Proc. ACM MobiSys (2007), pp. 258-271.
-
(2007)
Proc. ACM MobiSys
, pp. 258-271
-
-
Cheng, J.1
Wong, S.2
Yang, H.3
Lu, S.4
-
15
-
-
30044436588
-
Content availability, pollution and poisoning in file sharing peer-to-peer networks
-
ACM
-
CHRISTIN, N., WEIGEND, A., AND CHUANG, J. Content availability, pollution and poisoning in file sharing peer-to-peer networks. In Proceedings of the 6th ACM conference on Electronic commerce (2005), ACM, pp. 68-77.
-
(2005)
Proceedings of the 6th ACM Conference on Electronic Commerce
, pp. 68-77
-
-
Christin, N.1
Weigend, A.2
Chuang, J.3
-
16
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
EGELE, M., KRUEGEL, C., KIRDA, E., AND VIGNA, G. PiOS: Detecting privacy leaks in iOS applications. In Proceedings of the Network and Distributed System Security Symposium (2011).
-
(2011)
Proceedings of the Network and Distributed System Security Symposium
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
17
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Vancouver, BC, Canada
-
ENCK, W., GILBERT, P., CHUN, B., COX, L., JUNG, J., MCDANIEL, P., AND SHETH, A. TaintDroid: an Information-Flow tracking system for realtime privacy monitoring on smartphones. In OSDI 2010 (Vancouver, BC, Canada).
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.7
-
18
-
-
85025700509
-
A study of android application security
-
ENCK, W., OCTEAU, D., MCDANIEL, P., AND CHAUDHURI, S. A study of android application security. In Proc. of the 20th USENIX Security Symposium (2011).
-
(2011)
Proc. of the 20th USENIX Security Symposium
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
19
-
-
74049155830
-
On lightweight mobile phone application certification
-
Chicago, IL
-
ENCK, W., ONGTANG, M., AND MCDANIEL, P. On lightweight mobile phone application certification. In Proc. ACM CCS (Chicago, IL), pp. 235-245.
-
Proc. ACM CCS
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
20
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM
-
FELT, A., FINIFTER, M., CHIN, E., HANNA, S., AND WAGNER, D. A survey of mobile malware in the wild. In Proc. ACM work. Security and privacy in smartphones and mobile devices (2011), ACM, pp. 3-14.
-
(2011)
Proc. ACM Work. Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
22
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
Chicago, IL, ACM
-
HORNYACK, P., HAN, S., JUNG, J., SCHECHTER, S., AND WETHERALL, D. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proc. ACM CCS (Chicago, IL, 2011), ACM, pp. 639-652.
-
(2011)
Proc. ACM CCS
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
23
-
-
85076487784
-
DeSEO: Combating search-result poisoning
-
San Francisco, CA, Aug.
-
JOHN, J., YU, F., XIE, Y., ABADI, M., AND KRISHNAMURTHY, A. deSEO: Combating search-result poisoning. In Proceedings of USENIX Security 2011 (San Francisco, CA, Aug. 2011).
-
(2011)
Proceedings of USENIX Security 2011
-
-
John, J.1
Yu, F.2
Xie, Y.3
Abadi, M.4
Krishnamurthy, A.5
-
24
-
-
84867438639
-
An conundrum of permissions: Installing applications on an android smartphone
-
KELLEY, P., CONSOLVO, S., CRANOR, L., JUNG, J., SADEH, N., AND WETHERALL, D. An conundrum of permissions: Installing applications on an android smartphone. In the Workshop on Usable Security (2012).
-
(2012)
The Workshop on Usable Security
-
-
Kelley, P.1
Consolvo, S.2
Cranor, L.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
27
-
-
80755144007
-
Fashion crimes: Trending-term exploitation on the web
-
Chicago, IL
-
MOORE, T., LEONTIADIS, N., AND CHRISTIN, N. Fashion crimes: trending-term exploitation on the web. In Proc. ACM CCS (Chicago, IL, 2011), pp. 455-466.
-
(2011)
Proc. ACM CCS
, pp. 455-466
-
-
Moore, T.1
Leontiadis, N.2
Christin, N.3
-
29
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
IEEE
-
SCHMIDT, A., BYE, R., SCHMIDT, H., CLAUSEN, J., KIRAZ, O., YUKSEL, K., CAMTEPE, S., AND ALBAYRAK, S. Static analysis of executables for collaborative malware detection on android. In Proc. IEEE ICC (2009), IEEE, pp. 1-5.
-
(2009)
Proc. IEEE ICC
, pp. 1-5
-
-
Schmidt, A.1
Bye, R.2
Schmidt, H.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.6
Camtepe, S.7
Albayrak, S.8
-
30
-
-
77950125602
-
Detecting symbian os malware through static function call analysis
-
IEEE
-
SCHMIDT, A., CLAUSEN, J., CAMTEPE, A., AND ALBAYRAK, S. Detecting symbian os malware through static function call analysis. In Proc. MALWARE (2009), IEEE, pp. 15-22.
-
(2009)
Proc. MALWARE
, pp. 15-22
-
-
Schmidt, A.1
Clausen, J.2
Camtepe, A.3
Albayrak, S.4
-
31
-
-
84874823900
-
Reconstructing dalvik applications
-
Mar.
-
SCHÖNEFELD, M. Reconstructing dalvik applications. CANSECWEST 2009 (Mar. 2009).
-
(2009)
CANSECWEST 2009
-
-
Schönefeld, M.1
-
35
-
-
85034040740
-
Perspectives: Improving SSH-style host authentication with multi-path probing
-
WENDLANDT, D., ANDERSEN, D., AND PERRIG, A. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX Annual Technical Conference (2008), pp. 321-334.
-
(2008)
USENIX Annual Technical Conference
, pp. 321-334
-
-
Wendlandt, D.1
Andersen, D.2
Perrig, A.3
-
38
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
ZHOU, Y., WANG, Z., ZHOU, W., AND JIANG, X. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS (2012).
-
(2012)
NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|