-
2
-
-
84904284045
-
-
Android market API. http://code.google.com/p/android-market-api/.
-
Android Market API
-
-
-
3
-
-
84879539698
-
-
Anzhi Market. http://www.anzhi.com.
-
-
-
-
4
-
-
84879540608
-
-
Apple app store, 2012. http://www.apple.com/iphone/from-the-app-store/.
-
(2012)
-
-
-
5
-
-
84879511442
-
-
Baksmali, 2012. http://code.google.com/p/smali/.
-
(2012)
-
-
-
6
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
ACM Press
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security, page 73. ACM Press, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 73
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
8
-
-
84879528005
-
-
Blackberry app world, 2012. http://appworld.blackberry.com/webstore/.
-
(2012)
Blackberry App World
-
-
-
9
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
ACM Press
-
A. Bose, X. Hu, K. G. Shin, and T. Park. Behavioral detection of malware on mobile handsets. In Proceeding of the 6th international conference on Mobile systems, applications, and services, page 225. ACM Press, 2008.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 225
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
11
-
-
78651400128
-
Developing secure mobile applications for android
-
Oct.
-
J. Burns. Developing Secure Mobile Applications for Android. iSEC Partners, Oct. 2008. http://www.isecpartners.com/files/iSEC-Securing-Android- Apps.pdf.
-
(2008)
ISEC Partners
-
-
Burns, J.1
-
12
-
-
79961035117
-
Analyzing inter-application communication in android
-
New York, NY, USA. ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pages 239h-252, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
14
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, pages 393-407, 2010.
-
(2010)
OSDI
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
15
-
-
85025700509
-
A study of Android application security
-
San Francisco, CA, USA
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android application security. In Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, USA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
17
-
-
60049085302
-
Understanding android security
-
January/February
-
W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. IEEE Security & Privacy Magazine, 7(1):50-57, January/February 2009.
-
(2009)
IEEE Security & Privacy Magazine
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
18
-
-
80755187788
-
Android permissions demystified
-
Chicago, Illinois, USA, Oct.
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, Chicago, Illinois, USA, Oct. 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
19
-
-
80755181021
-
A survey of mobile malware in the wild
-
Chicago, Illinois, USA, Oct.
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In ACM Workshop on Security and Privacy in Mobile Devices, Chicago, Illinois, USA, Oct. 2011.
-
(2011)
ACM Workshop on Security and Privacy in Mobile Devices
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
20
-
-
84879544919
-
-
GFan Market. http://www.gfan.com/.
-
-
-
-
21
-
-
84879534055
-
-
Google play, 2012. https://play.google.com/store/apps.
-
(2012)
-
-
-
22
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day android malware detection
-
June
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2012.
-
(2012)
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
23
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011.
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
24
-
-
80755168347
-
Bitshred: Feature hashing malware for scalable triage and semantic analysis
-
New York, NY, USA. ACM
-
J. Jang, D. Brumley, and S. Venkataraman. Bitshred: feature hashing malware for scalable triage and semantic analysis. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 309-320, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 309-320
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
28
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM Press
-
H. Kim, J. Smith, and K. G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proceeding of the 6th international conference on Mobile systems, applications, and services, page 239. ACM Press, 2008.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 239
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
30
-
-
76649138917
-
VirusMeter: Preventing your cellphone from spies
-
Berlin, Heidelberg, Springer Berlin Heidelberg
-
L. Liu, G. Yan, X. Zhang, and S. Chen. VirusMeter: preventing your cellphone from spies. In Recent Advances in Intrusion Detection, volume 5758, pages 244-264, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.
-
(2009)
Recent Advances in Intrusion Detection
, vol.5758
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
31
-
-
84865574920
-
Android and security
-
Feb.
-
H. Lockheimer. Android and Security. Google Mobile Blog, Feb. 2012. http://googlemobile.blogspot.com/2012/02/android-and-security.html.
-
(2012)
Google Mobile Blog
-
-
Lockheimer, H.1
-
32
-
-
84867361237
-
Mobile threat report
-
Lookout Mobile Security. Aug.
-
Lookout Mobile Security. Mobile threat report. Technical report, Lookout Mobile Security, Aug. 2011.
-
(2011)
Technical Report Lookout Mobile Security
-
-
-
37
-
-
77958124029
-
Not so great expectations: Why application markets haven't failed security
-
Oct.
-
P. McDaniel and W. Enck. Not so great expectations: Why application markets haven't failed security. IEEE Security & Privacy, 8(5):76-78, Oct. 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.5
, pp. 76-78
-
-
McDaniel, P.1
Enck, W.2
-
38
-
-
84889078034
-
ADAM: An automatic and extensible platform to stress test android anti-virus systems
-
Heraklion, Crete, Greece, July
-
Min Zheng, Patrick P.C. Lee, and John C.S. Lui. ADAM: an automatic and extensible platform to stress test android anti-virus systems. In Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'12), Heraklion, Crete, Greece, July 2012.
-
(2012)
Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'12)
-
-
Zheng, M.1
Lee, P.P.C.2
Lui, J.C.S.3
-
39
-
-
84879541398
-
-
Ndoo market. http://www.nduoa.com/.
-
-
-
-
40
-
-
84879535007
-
-
NetQin Mobile Security, 2012. http://www.netqin.com/en/.
-
(2012)
-
-
-
41
-
-
84855671047
-
Forecast: Skimming off the malware cream
-
New York, NY, USA. ACM
-
M. Neugschwandtner, P. M. Comparetti, G. Jacob, and C. Kruegel. Forecast: skimming off the malware cream. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, pages 11-20, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11
, pp. 11-20
-
-
Neugschwandtner, M.1
Comparetti, P.M.2
Jacob, G.3
Kruegel, C.4
-
44
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
New York, NY, USA. ACM
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, page 241-252, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
45
-
-
60649088451
-
Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables
-
Washington, DC, USA. IEEE Computer Society
-
R. Perdisci, A. Lanzi, and W. Lee. Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables. In Proceedings of the 2008 Annual Computer Security Applications Conference, ACSAC '08, pages 301-310, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference, ACSAC '08
, pp. 301-310
-
-
Perdisci, R.1
Lanzi, A.2
Lee, W.3
-
46
-
-
77957567965
-
Multiple correspondence analysis
-
SAGE Publications, Los Angeles, California, USA
-
B. L. Roux and H. Rouanet. Multiple Correspondence Analysis. Number 163 in Quantitative Applications in the Social Sciences. SAGE Publications, Los Angeles, California, USA, 2010.
-
(2010)
Quantitative Applications in the Social Sciences
, Issue.163
-
-
Roux, B.L.1
Rouanet, H.2
-
47
-
-
84864033989
-
Android permissions: A perspective combining risks and benefits
-
New York, NY, USA. ACM
-
B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Android permissions: a perspective combining risks and benefits. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, page 13-22, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12
, pp. 13-22
-
-
Sarma, B.P.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
49
-
-
84879533662
-
-
SoftAndroid Market. http://softandroid.ru.
-
-
-
-
51
-
-
84879519953
-
-
Windows Phone: Marketplace, 2011. http://www.windowsphone.com/en-US/ marketplace.
-
(2011)
-
-
-
54
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Feb.
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2012.
-
(2012)
Proceedings of the Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
55
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming information-stealing smartphone applications (on android). In TRUST, pages 93-107, 2011.
-
(2011)
TRUST
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|