-
2
-
-
85175130226
-
-
ANDROID OS. http://www.android.com/.
-
-
-
-
4
-
-
85175130052
-
-
APPLE. iOS4, 2011. http://www.apple.com/iphone/.
-
(2011)
iOS4
-
-
-
5
-
-
84873741695
-
-
Febuary
-
BALLANO, M. Android Threats Getting Steamy. Symantec Official Blog, Febuary 2011. http://www.symantec.com/connect/blogs/android-threats-getting- steamy.
-
(2011)
Android Threats Getting Steamy
-
-
Ballano, M.1
-
6
-
-
85166275153
-
Protecting Browsers from Extension Vulnerabilities
-
BARTH, A., FELT, A. P., SAXENA, P., AND BOODMAN, A. Protecting Browsers from Extension Vulnerabilities. In Network and Distributed System Security Symposium (NDSS) (Feb. 2010).
-
Network and Distributed System Security Symposium (NDSS) (Feb. 2010)
-
-
Barth, A.1
Felt, A.P.2
Saxena, P.3
Boodman, A.4
-
7
-
-
85175130880
-
-
CHROMIUM. Feb.
-
CHROMIUM. Security Issues. https://code.google.com/p/chromium/issues/ list?q=label:Security, Feb. 2011.
-
(2011)
Security Issues
-
-
-
8
-
-
33751067472
-
A Safety-Oriented Platform for Web Applications
-
COX, R. S., GRIBBLE, S. D., LEVY, H. M., AND HANSEN, J. G. A Safety-Oriented Platform for Web Applications. In IEEE Symposium on Security and Privacy (2006).
-
IEEE Symposium on Security and Privacy (2006)
-
-
Cox, R.S.1
Gribble, S.D.2
Levy, H.M.3
Hansen, J.G.4
-
10
-
-
84859082751
-
-
FACEBOOK. Apps on Facebook.com, 2011. http://developers.facebook.com/ docs/guides/.
-
(2011)
Apps on Facebook.com
-
-
-
12
-
-
84867463760
-
-
Tech. Rep. UCB/EECS-2012-26, UC Berkeley
-
FELT, A. P., HA, E., EGELMAN, S., HANEY, A., CHIN, E., AND WAGNER, D. Android permissions: User attention, comprehension, and behavior. Tech. Rep. UCB/EECS-2012-26, UC Berkeley, 2012.
-
(2012)
Android Permissions: User Attention, Comprehension, and Behavior
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
13
-
-
85046879731
-
Permission Re-Delegation: Attacks and Defenses
-
FELT, A. P., .WANG, H. J., MOSHCHUK, A., HANNA, S., AND CHIN, E. Permission Re-Delegation: Attacks and Defenses. In USENIX Security Symposium (2011).
-
USENIX Security Symposium (2011)
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
14
-
-
33846306388
-
A Nitpicker's guide to a minimal-complexity secure GUI
-
FESKE, N., AND HELMUTH, C. A Nitpicker's guide to a minimal-complexity secure GUI. In ACSAC (2005).
-
(2005)
ACSAC
-
-
Feske, N.1
Helmuth, C.2
-
16
-
-
84878363259
-
What You See Is What They Get: Protecting Users from Unwanted Use of Microphones, Camera, and Other Sensors
-
HOWELL, J., AND SCHECHTER, S. What You See Is What They Get: Protecting Users from Unwanted Use of Microphones, Camera, and Other Sensors. In Web 2.0 Security and Privacy Workshop (2010).
-
Web 2.0 Security and Privacy Workshop (2010)
-
-
Howell, J.1
Schechter, S.2
-
17
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
Nov.
-
KARGER, P. A., ZURKO, M. E., BONIN, D. W., MASON, A. H., AND KAHN, C. E. A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering 17, 11 (Nov. 1991).
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, pp. 11
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
18
-
-
78650002259
-
Blade: An attack-agnostic approach for preventing drive-by malware infections
-
LU, L., YEGNESWARAN, V., PORRAS, P., AND LEE, W. Blade: an attack-agnostic approach for preventing drive-by malware infections. In ACM CCS (2010).
-
(2010)
ACM CCS
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
19
-
-
0026681952
-
Fitts' Law as a Research and Design Tool in Human-Computer Interaction
-
MACKENZIE, I. S. Fitts' Law as a Research and Design Tool in Human-Computer Interaction. Human-Computer Interaction (HCI) 7(1) (1992), 91-139.
-
(1992)
Human-Computer Interaction (HCI)
, vol.7
, Issue.1
, pp. 91-139
-
-
Mackenzie, I.S.1
-
21
-
-
84866918614
-
-
MICROSOFT. What is User Account Control?, 2011. http://windows.microsoft. com/en-US/windows-vista/What-is-User-Account-Control.
-
(2011)
What Is User Account Control?
-
-
-
22
-
-
34547636298
-
-
PhD thesis, Johns Hopkins University, Baltimore, MD, USA
-
MILLER, M. S. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, MD, USA, 2006.
-
(2006)
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
-
-
Miller, M.S.1
-
26
-
-
33845953872
-
-
Jan.
-
NSA CENTRAL SECURITY SERVICE. Security-Enhanced Linux. http://www.nsa.gov/research/selinux/, Jan. 2009.
-
(2009)
Security-Enhanced Linux
-
-
-
27
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
PETRONI, J R ., N. L., AND HICKS, M. Automated detection of persistent kernel control-flow attacks. In ACM CCS (2007).
-
(2007)
ACM CCS
-
-
Petroni, J.R.1
L, N.2
Hicks, M.3
-
30
-
-
77955224892
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
SESHADRI, A., LUK, M., QU, N., AND PERRIG, A. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In ACM SOSP (2007).
-
(2007)
ACM SOSP
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
31
-
-
85084163031
-
Design of the EROS Trusted Window System
-
SHAPIRO, J. S., VANDERBURGH, J., NORTHUP, E., AND CHIZMADIA, D. Design of the EROS Trusted Window System. In USENIX Security Symposium (2004).
-
USENIX Security Symposium (2004)
-
-
Shapiro, J.S.1
Vanderburgh, J.2
Northup, E.3
Chizmadia, D.4
-
33
-
-
33748549923
-
Polaris: Virus-Safe Computing for Windows XP
-
Sept.
-
STIEGLER, M., KARP, A. H., YEE, K.-P., CLOSE, T., AND MILLER, M. S. Polaris: Virus-Safe Computing for Windows XP. Communications of the ACM 49 (Sept. 2006), 83-88.
-
(2006)
Communications of the ACM
, vol.49
, pp. 83-88
-
-
Stiegler, M.1
Karp, A.H.2
Yee, K.-P.3
Close, T.4
Miller, M.S.5
-
34
-
-
84857516359
-
Trust and Protection in the Illinois Browser Operating System
-
TANG, S., MAI, H., AND KING, S. T. Trust and Protection in the Illinois Browser Operating System. In USENIX OSDI (2010).
-
(2010)
USENIX OSDI
-
-
Tang, S.1
Mai, H.2
King, S.T.3
-
36
-
-
77954608267
-
The Multi-Principal OS Construction of the Gazelle Web Browser
-
WANG, H. J., GRIER, C., MOSHCHUK, A., KING, S. T., CHOUDHURY, P., AND VENTER, H. The Multi-Principal OS Construction of the Gazelle Web Browser. In USENIX Security Symposium (2009).
-
USENIX Security Symposium (2009)
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
39
-
-
12844271558
-
Aligning Security and Usability
-
Sept.
-
YEE, K.-P. Aligning Security and Usability. IEEE Security and Privacy 2(5) (Sept. 2004), 48-55.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.-P.1
-
40
-
-
37049026322
-
Making information flow explicit in HiStar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIÈRES, D. Making information flow explicit in HiStar. In USENIX OSDI (2006).
-
(2006)
USENIX OSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|