-
8
-
-
84878360437
-
-
AVG Mobilation. http://free.avg.com/us-en/antivirus-for-android.tpl-crp.
-
AVG Mobilation
-
-
-
9
-
-
85175133214
-
-
Symantec. http://www.symantec.com/.
-
Symantec
-
-
-
10
-
-
85175133485
-
-
Fortinet. http://www.fortinet.com/.
-
Fortinet
-
-
-
11
-
-
85175134089
-
-
TrendMicro. http://www.virustotal.com/.
-
TrendMicro
-
-
-
12
-
-
85175133662
-
-
Security Alerts. http://www.csc.ncsu.edu/faculty/jiang/.
-
Security Alerts
-
-
-
16
-
-
85175130845
-
-
WAPS. http://www.waps.cn/.
-
WAPS
-
-
-
17
-
-
84878362591
-
-
GGTracker Technical Tear Down. http://blog.mylookout.com/wp-content/ uploads/2011/06/GGTracker-TeardownLookout-Mobile-Security.pdf.
-
GGTracker Technical Tear Down
-
-
-
21
-
-
85175133629
-
-
QR code. http://en.wikipedia.org/wiki/QR-code.
-
QR Code
-
-
-
23
-
-
85175132877
-
-
Asroot. http://milw0rm.com/sploits/android-root-20090816.tar.gz.
-
Asroot
-
-
-
24
-
-
84878360990
-
-
android trickery. http://c-skills.blogspot.com/2010/07/android-trickery. html.
-
Android Trickery
-
-
-
25
-
-
85175129582
-
-
Droid2. http://c-skills.blogspot.com/2010/08/droid2.html.
-
Droid2
-
-
-
26
-
-
84878357724
-
-
Zimperlich sources. http://c-skills.blogspot.com/2011/02/zimperlich- sources.html.
-
Zimperlich Sources
-
-
-
27
-
-
84864373592
-
-
adb trickery #2. http://c-skills.blogspot.com/2011/01/adb-trickery-again. html.
-
Adb Trickery #2
-
-
-
28
-
-
84864373578
-
-
yummy yummy, GingerBreak! http://c-skills.blogspot.com/2011/04/yummy- yummy-gingerbreak.html.
-
Yummy Yummy, GingerBreak!
-
-
-
31
-
-
85175131994
-
-
LeNa (Legacy Native) Teardown. http://blog.mylookout. com/wp-content/uploads/2011/10/LeNa-Legacy-Native-Teardown-Lookout-Mobile- Security1.pdf.
-
LeNa (Legacy Native) Teardown
-
-
-
34
-
-
79955570859
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
W. Enck, P. Gilbert, B.-g. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," in Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010.
-
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
35
-
-
84888331381
-
PiOS: Detecting Privacy Leaks in iOS Applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, "PiOS: Detecting Privacy Leaks in iOS Applications," in Proceedings of the 18th Annual Symposium on Network and Distributed System Security, 2011.
-
Proceedings of the 18th Annual Symposium on Network and Distributed System Security, 2011
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
36
-
-
79961035117
-
Analyzing Inter-Application Communication in Android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing Inter-Application Communication in Android," in 9th Annual International Conference on Mobile Systems, Applications, and Services, 2011.
-
9th Annual International Conference on Mobile Systems, Applications, and Services, 2011
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
37
-
-
85046879731
-
Permission Re-Delegation: Attacks and Defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, "Permission Re-Delegation: Attacks and Defenses," in Proceedings of the 20th USENIX Security Symposium, 2011.
-
Proceedings of the 20th USENIX Security Symposium, 2011
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
38
-
-
85165758676
-
Systematic Detection of Capability Leaks in Stock Android Smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang, "Systematic Detection of Capability Leaks in Stock Android Smartphones," in Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
39
-
-
34547446292
-
The Confused Deputy: (Or why capabilities might have been invented)
-
October
-
N. Hardy, "The Confused Deputy: (or why capabilities might have been invented)," ACM SIGOPS Operating Systems Review, vol. 22, October 1998.
-
(1998)
ACM SIGOPS Operating Systems Review
, vol.22
-
-
Hardy, N.1
-
40
-
-
85066347237
-
QUIRE: Lightweight Provenance for Smart Phone Operating Systems
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach, "QUIRE: Lightweight Provenance for Smart Phone Operating Systems," in Proceedings of the 20th USENIX Security Symposium, 2011.
-
Proceedings of the 20th USENIX Security Symposium, 2011
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
41
-
-
84888341014
-
Towards Taming Privilege-Escalation Attacks on Android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry, "Towards Taming Privilege-Escalation Attacks on Android," in Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
42
-
-
80755187788
-
Android Permissions Demystied
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android Permissions Demystied," in Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
43
-
-
85030411408
-
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications
-
S. Schrittwieser, P. Frhwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, and E. Weippl, "Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications," in Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012
-
-
Schrittwieser, S.1
Frhwirt, P.2
Kieseberg, P.3
Leithner, M.4
Mulazzani, M.5
Huber, M.6
Weippl, E.7
-
44
-
-
74049108559
-
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel, and T. L. Porta, "On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core," in Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009.
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.6
Porta, T.L.7
-
45
-
-
84860660623
-
Unsafe Exposure Analysis of Mobile In-App Advertisements
-
M. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, "Unsafe Exposure Analysis of Mobile In-App Advertisements," in Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012.
-
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
-
-
Grace, M.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
46
-
-
77954487766
-
Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints
-
M. Nauman, S. Khan, and X. Zhang, "Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010.
-
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
47
-
-
84860764042
-
Mock-Droid: Trading Privacy for Application Functionality on Smartphones
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, "Mock-Droid: Trading Privacy for Application Functionality on Smartphones," in Proceedings of the 12th International Workshop on Mobile Computing System and Applications, 2011.
-
Proceedings of the 12th International Workshop on Mobile Computing System and Applications, 2011
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
48
-
-
85037359376
-
Taming Information-Stealing Smartphone Applications (on Android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, "Taming Information-Stealing Smartphone Applications (on Android)," in Proceeding of the 4th International Conference on Trust and Trustworthy Computing, 2011.
-
Proceeding of the 4th International Conference on Trust and Trustworthy Computing, 2011
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
-
49
-
-
80755187778
-
These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, "These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications," in Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
52
-
-
80755143400
-
L4Android: A Generic Operating System Framework for Secure Smartphones
-
M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter, "L4Android: A Generic Operating System Framework for Secure Smartphones," in Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, 2011.
-
Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, 2011
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
53
-
-
82655162792
-
Cells: A Virtual Mobile Smartphone Architecture
-
J. Andrus, C. Dall, A. Van't Hof, O. Laadan, and J. Nieh, "Cells: A Virtual Mobile Smartphone Architecture," in Proceedings of the 23rd ACM Symposium on Operating Systems Principles, 2011.
-
Proceedings of the 23rd ACM Symposium on Operating Systems Principles, 2011
-
-
Andrus, J.1
Dall, C.2
Van't Hof, A.3
Laadan, O.4
Nieh, J.5
-
54
-
-
85175134235
-
A Survey of Mobile Malware In The Wild
-
A. Porter Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A Survey of Mobile Malware In The Wild," in Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, 2011.
-
Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, 2011
-
-
Porter Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
55
-
-
80051969895
-
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
-
M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf, "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices," in Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011.
-
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
-
-
Becher, M.1
Freiling, F.C.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
56
-
-
85172622386
-
Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets," in Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
57
-
-
85137132511
-
DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces," in Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, 2012.
-
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, 2012
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
58
-
-
85025700509
-
A Study of Android Application Security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A Study of Android Application Security," in Proceedings of the 20th USENIX Security Symposium, 2011.
-
Proceedings of the 20th USENIX Security Symposium, 2011
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
|