-
2
-
-
80054837552
-
Falling asleep with angry birds, facebook and kindle: A large scale study on mobile application usage
-
M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Bauer. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage. In MobileHCI, 2011.
-
(2011)
MobileHCI
-
-
Böhmer, M.1
Hecht, B.2
Schöning, J.3
Krüger, A.4
Bauer, G.5
-
3
-
-
84970901426
-
TouchLogger: Inferring keystrokes on touch screen from smartphone motion
-
L. Cai and H. Chen. TouchLogger: inferring keystrokes on touch screen from smartphone motion. In HotSec, 2011.
-
(2011)
HotSec
-
-
Cai, L.1
Chen, H.2
-
5
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
S. Egelman, L. F. Cranor, and J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI, 2008.
-
(2008)
CHI
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
6
-
-
79955570859
-
TaintDroid: An information flow tracking system for realtime privacy monitoring on mobile phones
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An information flow tracking system for realtime privacy monitoring on mobile phones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
7
-
-
77955038912
-
Diversity in smartphone usage
-
H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, and D. Estrin. Diversity in smartphone usage. In MobiSys, 2010.
-
(2010)
MobiSys
-
-
Falaki, H.1
Mahajan, R.2
Kandula, S.3
Lymberopoulos, D.4
Govindan, R.5
Estrin, D.6
-
9
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
-
October
-
A. Y. Fu, L. Wenyin, and X. Deng. Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD). IEEE Transactions on Dependable and Secure Computing, 3, October 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
-
-
Fu, A.Y.1
Wenyin, L.2
Deng, X.3
-
11
-
-
79961096636
-
DTA++: Dynamic taint analysis with targeted control-flow propagation
-
M. G. Kang, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic taint analysis with targeted control-flow propagation. In NDSS, 2011.
-
(2011)
NDSS
-
-
Kang, M.G.1
McCamant, S.2
Poosankam, P.3
Song, D.4
-
12
-
-
85018519069
-
Safe passage for passwords and other sensitive data
-
J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS, 2009.
-
(2009)
NDSS
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
13
-
-
84860294696
-
ACCessory: Password inference using accelerometers on smartphones
-
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. ACCessory: password inference using accelerometers on smartphones. In HotMobile, 2012.
-
(2012)
HotMobile
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
14
-
-
84867706703
-
Exploring iPhone usage: The influence of socioeconomic differences on smartphone adoption, usage and usability
-
A. Rahmati, C. Tossell, C. Shepard, P. Kortum, and L. Zhong. Exploring iPhone usage: the influence of socioeconomic differences on smartphone adoption, usage and usability. In MobileHCI, 2012.
-
(2012)
MobileHCI
-
-
Rahmati, A.1
Tossell, C.2
Shepard, C.3
Kortum, P.4
Zhong, L.5
-
15
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan. User-driven access control: Rethinking permission granting in modern operating systems. In IEEE Security and Privacy, 2012.
-
(2012)
IEEE Security and Privacy
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
16
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
17
-
-
34548786769
-
Emperors new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. Emperors new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In IEEE Security and Privacy, 2007.
-
(2007)
IEEE Security and Privacy
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
18
-
-
51149098551
-
An overview of the tesseract OCR engine
-
R. Smith. An overview of the Tesseract OCR engine. In ICDAR, 2007.
-
(2007)
ICDAR
-
-
Smith, R.1
-
19
-
-
84857516359
-
Trust and protection in the illinois browser operating system
-
S. Tang, H. Mai, and S. T. King. Trust and protection in the Illinois browser operating system. In OSDI, 2010.
-
(2010)
OSDI
-
-
Tang, S.1
Mai, H.2
King, S.T.3
-
20
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In CHI, 2006.
-
(2006)
CHI
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
21
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In IEEE Security and Privacy, 2012.
-
(2012)
IEEE Security and Privacy
-
-
Zhou, Y.1
Jiang, X.2
|