-
1
-
-
0004072686
-
-
Prentice Hall, New Jersey
-
Aho, A.V., Sethi, R. and Ullman, J.D., Compilers: Principles, Techniques, and Tools, Prentice Hall, New Jersey, 2006.
-
(2006)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
4
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
(San Diego, CA, USA)
-
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A. and Shastry, B., Towards Taming Privilege-Escalation Attacks on Android, in 19th Annual Network & Distributed System Security Symposium, (San Diego, CA, USA, 2012).
-
(2012)
19th Annual Network & Distributed System Security Symposium
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.5
Shastry, B.6
-
5
-
-
70450260685
-
Language-based security on android
-
Dublin, Ireland, DOI=http://dx.doi.org/10.1145/1554339.1554341
-
Chaudhuri, A., Language-Based Security on Android, in ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, (Dublin, Ireland, 2009). 1-7. DOI=http://dx.doi.org/10.1145/1554339.1554341.
-
(2009)
ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
, pp. 1-7
-
-
Chaudhuri, A.1
-
6
-
-
60049085302
-
Understanding android security
-
Enck, W., Ongtang, M. and McDaniel, P., Understanding Android Security, IEEE Security and Privacy, Volume 7(1) . 50-54.
-
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-54
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
7
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Vancouver, BC, Canada
-
Enck, W., Gilbert, P., Chun, B, Cox, L.P., Jung, J., McDaniel, P. and Sheth, A.N., TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, in Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, (Vancouver, BC, Canada, 2010).
-
(2010)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
8
-
-
80755187788
-
Android permissions demystified
-
Chicago, IL, USA, DOI=http://dx.doi.org/10.1145/2046707.2046779
-
Felt, A., Chin, E., Hanna, S., Song, D. and Wagner, D., Android permissions demystified, in 18th ACM Conference on Computer and Communications Security (Chicago, IL, USA, 2011). 627-638. DOI=http://dx.doi.org/10.1145/ 2046707.2046779.
-
(2011)
18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
9
-
-
0003518498
-
-
Third Edition, Addison-Wesley, Boston
-
Gosling, J., Joy, B., Steele, G. and Bracha, G., The Java Language Specification (Third Edition). Addison-Wesley, Boston, 2005.
-
(2005)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
Bracha, G.4
-
11
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
Chicago, IL, USA, DOI=http://dx.doi.org/10.1145/2046707.2046780
-
Hornyack, P., Han, S., Jung, J., Schechtery, S. and Wetherall, D., These aren't the droids you're looking for: retrofitting android to protect data from imperious applications, in 18th ACM Conference on Computer and Communications Security, (Chicago, IL, USA, 2011). 639-652. DOI=http://dx.doi.org/10.1145/ 2046707.2046780.
-
(2011)
18th ACM Conference on Computer and Communications Security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechtery, S.4
Wetherall, D.5
-
12
-
-
84868344703
-
Model-based conformance testing for android, in advances in information and computer security
-
Fukuoka, JAPAN, Springer
-
Jing, Y., Ahn, G. and Hu, H., Model-Based Conformance Testing for Android, in Advances in Information and Computer Security, 7th International Workshop on Security, IWSEC (Fukuoka, JAPAN, 2012). Springer, 1-18.
-
(2012)
7th International Workshop on Security, IWSEC
, pp. 1-18
-
-
Jing, Y.1
Ahn, G.2
Hu, H.3
-
13
-
-
84860652586
-
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
-
DOI=http://dx.doi.org/10.3929/ethz-a-006720730
-
Marforio, C., Aurélien, F. and Capkun, S. 2011. Application collusion attack on the permission-based security model and its implications for modern smartphone systems, Technical Report. Eidgenössische Technische Hochschule Zürich. DOI=http://dx.doi.org/10.3929/ethz-a-006720730.
-
(2011)
Technical Report. Eidgenössische Technische Hochschule Zürich
-
-
Marforio, C.1
Aurélien, F.2
Capkun, S.3
-
15
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
San Diego, CA, USA, 2011
-
Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A. and Wang, X. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, in 18th Annual Network and Distributed System Security Symposium, (San Diego, CA, USA, 2011).
-
(2011)
18th Annual Network and Distributed System Security Symposium
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
19
-
-
84870428915
-
-
Google Play, https://play.google.com/store.
-
Google Play
-
-
-
22
-
-
84866352709
-
-
permission
-
(permission) Android developers, 2012, http://developer.android.com/ guide/topics/manifest/permission-element.html.
-
(2012)
Android Developers
-
-
|