-
1
-
-
84911932665
-
-
Online; accessed at Dec 1, 2011
-
MMSBG: An Open-Source Project. https://code.google.com/p/mmsbg. Online; accessed at Dec 1, 2011.
-
MMSBG: An Open-Source Project
-
-
-
2
-
-
84874864380
-
-
Online; accessed at Dec 1, 2011
-
ProGuard | Android Developers http://developer.android.com/guide/ developing/tools/proguard.html. Online; accessed at Dec 1, 2011.
-
ProGuard | Android Developers
-
-
-
4
-
-
84874888114
-
-
ALERT, Online; accessed at Dec 1, 2011
-
AndroidCommunity. [ALERT] New Trojan Called Hong Tou Tou Lurking. http://androidcommunity.com/android-trojan-alert-hong-tou-tou-20110216/. Online; accessed at Dec 1, 2011.
-
New Trojan Called Hong Tou Tou Lurking
-
-
-
5
-
-
0033359493
-
Experiments with clustering as a software remodularization method
-
Washington, DC, USA, IEEE Computer Society
-
Nicolas Anquetil, Cédric Fourrier, and Timothy C. Lethbridge. Experiments with Clustering as a Software Remodularization Method. In Proceedings of the Sixth Working Conference on Reverse Engineering, WCRE '99, pages 235-, Washington, DC, USA, 1999. IEEE Computer Society.
-
(1999)
Proceedings of the Sixth Working Conference on Reverse Engineering, WCRE '99
, pp. 235
-
-
Anquetil, N.1
Fourrier, C.2
Lethbridge, T.C.3
-
6
-
-
84874847073
-
-
Online; accessed at Dec 1, 2011
-
AppBrain. Number of Available Android Applications. http://www.appbrain. com/stats/number-ofandroid-apps. Online; accessed at Dec 1, 2011.
-
Number of Available Android Applications
-
-
-
7
-
-
84874827796
-
Seeding a security-enhancing infrastructure for multi-market application ecosystems
-
Carleton University, Online; accessed at Dec 1, 2011
-
David Barrera, William Enck, and Paul Oorschot. Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report, School of Computer Science, Carleton University, http://www.scs.carleton.ca/shared/research/tech-reports/2010/TR-11-06%20Barrera. pdf. Online; accessed at Dec 1, 2011.
-
Technical Report, School of Computer Science
-
-
Barrera, D.1
Enck, W.2
Oorschot, P.3
-
8
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
David Barrera, H. Günȩs Kayacik, Paul C. van Oorschot, and Anil Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
10
-
-
84875264064
-
Towards taming privilege-escalation attacks on android
-
Feb.
-
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. Towards Taming Privilege-Escalation Attacks on Android. In 19th Annual Network & Distributed System Security Symposium (NDSS), Feb 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
11
-
-
79961035117
-
Analyzing inter-application communication in android
-
Erika Chin, Adrienne Felt, Kate Greenwood, and David Wagner. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, 2011.
-
(2011)
Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2011
-
-
Chin, E.1
Felt, A.2
Greenwood, K.3
Wagner, D.4
-
12
-
-
84865590234
-
Attack of the clones: Detecting cloned applications on android markets
-
Sara Foresti, Moti Yung, and Fabio Martinelli, editors, volume 7459 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
Jonathan Crussell, Clint Gibler, and Hao Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, Computer Security âǍ Ş ESORICS 2012, volume 7459 of Lecture Notes in Computer Science, pages 37-54. Springer Berlin Heidelberg, 2012.
-
(2012)
Computer Security âǍ Ş ESORICS 2012
, pp. 37-54
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
13
-
-
85066347237
-
QUIRE: Lightweight provenance for smart phone operating systems
-
San Francisco, CA
-
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan Wallach. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.5
-
14
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
February
-
Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11, February 2011.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
15
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
William Enck, Peter Gilbert, Byung-gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11, 2011.
-
(2011)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.7
-
16
-
-
85025700509
-
A study of android application security
-
San Francisco, CA
-
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11
-
-
Enck, W.1
Octeau, D.2
Mcdaniel, P.3
Chaudhuri, S.4
-
17
-
-
80755187788
-
Android permissions demystified
-
Adrienne Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS' 11, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS' 11
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
18
-
-
85046879731
-
Permission Re-Delegation: Attacks and defense
-
San Francisco, CA
-
Adrienne Felt, Helen Wang, Alexander Moschhuk, Steve Hanna, and Erika Chin. Permission Re-Delegation: Attacks and Defense. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11
-
-
Felt, A.1
Wang, H.2
Moschhuk, A.3
Hanna, S.4
Chin, E.5
-
21
-
-
84881188396
-
Systematic detection of capability leaks in stock android smartphones
-
February
-
Michael Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
22
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day android malware detection
-
June
-
Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, and Xuxian Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In 10th International Conference on Mobile Systems, Applications and Services, June 2012.
-
(2012)
10th International Conference on Mobile Systems, Applications and Services
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
23
-
-
74049142314
-
Large-scale malware indexing using function-call graphs
-
New York, NY, USA, ACM
-
Xin Hu, Tzi-cker Chiueh, and Kang G. Shin. Large-Scale Malware Indexing using Function-Call Graphs. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 611-620, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 611-620
-
-
Hu, X.1
Chiueh, T.-C.2
Shin, K.G.3
-
25
-
-
84870681128
-
-
Google Inc. Online; accessed at Dec 1, 2011
-
Google Inc. Android Market. https://market.android.com/. Online; accessed at Dec 1, 2011.
-
Android Market
-
-
-
26
-
-
84874860439
-
-
February, Online; accessed at Dec 1, 2011
-
Lookout Inc. App Genome Report: February 2011. https://www.mylookout.com/ appgenome/. Online; accessed at Dec 1, 2011.
-
(2011)
Lookout Inc. App Genome Report
-
-
-
29
-
-
84874849226
-
-
Online; accessed at Dec 1, 2011
-
MobClix Inc. Mobclix SDK Integration Guide. http://support.mobclix.com/ attachments/token/lvbgrqsfpjgvgxb/?name=Detailed-Start-Guide-for-Android.pdf Online; accessed at Dec 1, 2011.
-
Mobclix SDK Integration Guide
-
-
-
31
-
-
84874887103
-
-
Online; accessed at Dec 1, 2011
-
Symantec Inc. Android Threats Getting Steamy. http://www.symantec.com/ connect/blogs/androidthreats-getting-steamy. Online; accessed at Dec 1, 2011.
-
Android Threats Getting Steamy
-
-
-
32
-
-
84874880907
-
-
Online; accessed at Dec 1, 2011
-
Symantec Inc. Android.Basebridge: Technical Details. http://www.symantec. com/security-response/writeup.jsp?docid=2011-060915-4938-99&tabid=2. Online; accessed at Dec 1, 2011.
-
Android.Basebridge: Technical Details
-
-
-
34
-
-
80755168347
-
BitShred: Feature hashing malware for scalable triage and semantic analysis
-
New York, NY, USA, ACM
-
Jiyong Jang, David Brumley, and Shobha Venkataraman. BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 309-320, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 309-320
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
35
-
-
0030615516
-
Assessing modular structure of legacy code based on mathematical concept analysis
-
New York, NY, USA, ACM
-
Christian Lindig and Gregor Snelting. Assessing Modular Structure of Legacy Code based on Mathematical Concept Analysis. In Proceedings of the 19th international conference on Software engineering, ICSE '97, pages 349-359, New York, NY, USA, 1997. ACM.
-
(1997)
Proceedings of the 19th International Conference on Software Engineering, ICSE '97
, pp. 349-359
-
-
Lindig, C.1
Snelting, G.2
-
36
-
-
0031632692
-
Using automatic clustering to produce high-level system organizations of source code
-
Washington, DC, USA, IEEE Computer Society
-
S. Mancoridis, B. S. Mitchell, C. Rorres, Y. Chen, and E. R. Gansner. Using Automatic Clustering to Produce High-Level System Organizations of Source Code. In Proceedings of the 6th International Workshop on Program Comprehension, IWPC '98, pages 45-, Washington, DC, USA, 1998. IEEE Computer Society.
-
(1998)
Proceedings of the 6th International Workshop on Program Comprehension, IWPC '98
, pp. 45
-
-
Mancoridis, S.1
Mitchell, B.S.2
Rorres, C.3
Chen, Y.4
Gansner, E.R.5
-
37
-
-
77950851532
-
Semantically rich application-centric security in android
-
Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. Semantically Rich Application-Centric Security in Android. In Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09, 2009.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09
-
-
Ongtang, M.1
Mclaughlin, S.2
Enck, W.3
Mcdaniel, P.4
-
39
-
-
84865599121
-
-
Online; accessed at Dec 1, 2011
-
Paolo Passeri. One Year of Android Malware (Full List)). http://paulsparrows.wordpress.com/2011/08/11/one-year-of-android-malware- fulllist/. Online; accessed at Dec 1, 2011.
-
One Year of Android Malware (Full List))
-
-
Passeri, P.1
-
42
-
-
0035307244
-
Concept analysis for module restructuring
-
April
-
Paolo Tonella. Concept Analysis for Module Restructuring. IEEE Trans. Softw. Eng., 27:351-363, April 2001.
-
(2001)
IEEE Trans. Softw. Eng.
, vol.27
, pp. 351-363
-
-
Tonella, P.1
-
43
-
-
0027188633
-
Data structures and algorithms for nearest neighbor search in general metric spaces
-
Philadelphia, PA, USA, Society for Industrial and Applied Mathematics
-
Peter N. Yianilos. Data Structures and Algorithms for Nearest Neighbor Search in General Metric Spaces. In Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms, SODA '93, pages 311-321, Philadelphia, PA, USA, 1993. Society for Industrial and Applied Mathematics.
-
(1993)
Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '93
, pp. 311-321
-
-
Yianilos, P.N.1
-
44
-
-
85137132511
-
DroidMOSS: Detecting repackaged smartphone applications in third-party android marketplaces
-
February
-
Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY '12, February 2012.
-
(2012)
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY '12
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
47
-
-
84864991061
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
February
-
Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|