-
1
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
ACM
-
D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A Methodology for Empirical Analysis of Permission-based Security Models and its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), pages 73-84. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS)
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.2
Van Oorschot, P.3
Somayaji, A.4
-
2
-
-
70549111101
-
Format-preserving encryption
-
Springer
-
M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Format-preserving Encryption. In Selected Areas in Cryptography, pages 295-312. Springer, 2009.
-
(2009)
Selected Areas in Cryptography
, pp. 295-312
-
-
Bellare, M.1
Ristenpart, T.2
Rogaway, P.3
Stegers, T.4
-
4
-
-
80054837552
-
Falling asleep with angry birds, facebook and kindle: A large scale study on mobile application usage
-
M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Gernot Bauer. Falling Asleep with Angry Birds, Facebook and Kindle: A Large Scale Study on Mobile Application Usage. In Proceedings of the International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI), 2011.
-
(2011)
Proceedings of the International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI)
-
-
Böhmer, M.1
Hecht, B.2
Schöning, J.3
Krüger, A.4
Gernot Bauer, G.5
-
7
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX conference on Operating Systems Design and Implementation (OSDI), 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
10
-
-
80755187788
-
Android permissions demystified
-
ACM
-
A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627-638. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
11
-
-
84867463760
-
Android permissions: User attention, comprehension, and behavior
-
Berkeley
-
A. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android Permissions: User Attention, Comprehension, and Behavior. Technical report, University of California, Berkeley, 2012.
-
(2012)
Technical Report, University of California
-
-
Felt, A.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
14
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
ACM
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids you're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM conference on Computer and Communications Security (CCS), pages 639-652. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
16
-
-
84869811164
-
Dr. Android and mr. Hide: Fine-grained security policies on unmodified android
-
J. Jeon, K. Micinski, J. Vaughan, N. Reddy, Y. Zhu, J. Foster, and T. Millstein. Dr. Android and Mr. Hide: Fine-grained Security Policies on Unmodified Android. Technical report, University of Maryland, 2011.
-
(2011)
Technical Report, University of Maryland
-
-
Jeon, J.1
Micinski, K.2
Vaughan, J.3
Reddy, N.4
Zhu, Y.5
Foster, J.6
Millstein, T.7
-
17
-
-
84867459428
-
Expectation and purpose: Understanding users mental models of mobile app privacy through crowdsourcing
-
J. Lin, S. Amini, J. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and Purpose: Understanding Users Mental Models of Mobile App Privacy Through Crowdsourcing. In Proceedings of the 14th ACM International Conference on Ubiquitous Computing (Ubicomp), 2012.
-
(2012)
Proceedings of the 14th ACM International Conference on Ubiquitous Computing (Ubicomp)
-
-
Lin, J.1
Amini, S.2
Hong, J.3
Sadeh, N.4
Lindqvist, J.5
Zhang, J.6
-
19
-
-
84881145341
-
-
MobiStealth. http://www.mobistealth.com/.
-
-
-
-
20
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
ACM
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (CCS), pages 328-332. ACM, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (CCS)
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
21
-
-
84881184382
-
-
Protect My Privacy (PmP). iOS Privacy App. http://www.protectmyprivacy. org.
-
IOS Privacy App
-
-
-
31
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming Information-Stealing Smartphone Applications (on Android). Trust and Trustworthy Computing (TRUST), pages 93-107, 2011.
-
(2011)
Trust and Trustworthy Computing (TRUST)
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|