-
1
-
-
84877706199
-
-
Questionnaire, http://www.aueb.gr/users/amylonas/instrument.pdf
-
Questionnaire
-
-
-
2
-
-
79957604407
-
Secure Software Installation on Smartphones
-
Barrera, D., Van Oorschot, P.: Secure Software Installation on Smartphones. IEEE Security & Privacy 9(3), 42-48 (2011)
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 42-48
-
-
Barrera, D.1
Van Oorschot, P.2
-
3
-
-
84861302816
-
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
-
Chia, P., Yamamoto, Y., Asokan, N.: Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals. In: Proceedings of the 21st International World Wide Web Conference, pp. 311-320 (2012)
-
(2012)
Proceedings of the 21st International World Wide Web Conference
, pp. 311-320
-
-
Chia, P.1
Yamamoto, Y.2
Asokan, N.3
-
4
-
-
84864978921
-
Measuring User Confidence in Smartphone Security and Privacy
-
Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring User Confidence in Smartphone Security and Privacy. In: Proceedigns of the 8th Symposium on Usable Privacy and Security (2012)
-
Proceedigns of the 8th Symposium on Usable Privacy and Security (2012)
-
-
Chin, E.1
Felt, A.P.2
Sekar, V.3
Wagner, D.4
-
5
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting privacy leaks in iOS applications. In: Proceedigns of the 18th Annual Network and Distributed System Security Symposium (2011)
-
Proceedigns of the 18th Annual Network and Distributed System Security Symposium (2011)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
6
-
-
85025700509
-
A study of Android application security
-
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: Proceedings of the 20th Usenix Security Symposium (2011)
-
Proceedings of the 20th Usenix Security Symposium (2011)
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
7
-
-
84865024594
-
Android Permissions: User Attention, Comprehension, and Behavior
-
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android Permissions: User Attention, Comprehension, and Behavior. In: Proceedigns of the 8th Symposium on Usable Privacy and Security (2012)
-
Proceedigns of the 8th Symposium on Usable Privacy and Security (2012)
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
8
-
-
85046879731
-
Permission Re-Delegation: Attacks and Defenses
-
Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission Re-Delegation: Attacks and Defenses. In: Proceedings of the 20th Usenix Security Symposium (2011)
-
Proceedings of the 20th Usenix Security Symposium (2011)
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
9
-
-
80755187788
-
Android permissions demystified
-
ACM, USA
-
Felt, A., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627-638. ACM, USA (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
11
-
-
85165758676
-
Systematic Detection of Capability Leaks in Stock Android Smartphones
-
Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic Detection of Capability Leaks in Stock Android Smartphones. In: Proceedings of the 19th Network and Distributed System Security Symposium (2012)
-
Proceedings of the 19th Network and Distributed System Security Symposium (2012)
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
12
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications
-
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, USA, pp. 639-652 (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, USA
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
13
-
-
0034446783
-
Evaluating certificate status information mechanisms
-
Iliadis, J., Gritzalis, D., Spinellis, D., Preneel, B., Katsikas, S.: Evaluating certificate status information mechanisms. In: Proceedings of the 7th ACM Computer and Communications Security Conference, pp. 1-8 (2000)
-
(2000)
Proceedings of the 7th ACM Computer and Communications Security Conference
, pp. 1-8
-
-
Iliadis, J.1
Gritzalis, D.2
Spinellis, D.3
Preneel, B.4
Katsikas, S.5
-
14
-
-
84868375110
-
A Conundrum of Permissions: Installing Applications on an Android Smartphone
-
Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. Springer, Heidelberg
-
Kelley, P., Consolvo, S., Cranor, L., Jung, J., Sadeh, N., Wetherall, D.: A Conundrum of Permissions: Installing Applications on an Android Smartphone. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol. 7398, pp. 68-79. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7398
, pp. 68-79
-
-
Kelley, P.1
Consolvo, S.2
Cranor, L.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
16
-
-
80052493767
-
Smartphone Security Evaluation: The Malware Attack Case
-
Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D.: Smartphone Security Evaluation: The Malware Attack Case. In: Proceedings of the 8th International Conference of Security and Cryptography, pp. 25-36 (2011)
-
(2011)
Proceedings of the 8th International Conference of Security and Cryptography
, pp. 25-36
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
17
-
-
84882242289
-
On the Feasibility of Malware Attacks in Smartphone Platforms
-
Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds.) ICETE 2011. Springer, Heidelberg
-
Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D.: On the Feasibility of Malware Attacks in Smartphone Platforms. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds.) ICETE 2011. CCIS, vol. 314, pp. 217-232. Springer, Heidelberg (2012)
-
(2012)
CCIS
, vol.314
, pp. 217-232
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
18
-
-
84891843335
-
Delegate the smartphone user? Security awareness in smartphone platforms
-
Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security 34, 47-66 (2013)
-
(2013)
Computers & Security
, vol.34
, pp. 47-66
-
-
Mylonas, A.1
Kastania, A.2
Gritzalis, D.3
-
19
-
-
80052791491
-
A Secure Smartphone Applications Roll-out Scheme
-
Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. Springer, Heidelberg
-
Mylonas, A., Tsoumas, B., Dritsas, S., Gritzalis, D.: A Secure Smartphone Applications Roll-out Scheme. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 49-61. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6863
, pp. 49-61
-
-
Mylonas, A.1
Tsoumas, B.2
Dritsas, S.3
Gritzalis, D.4
-
20
-
-
77950675112
-
Google Android: A Comprehensive Security Assessment
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A Comprehensive Security Assessment. IEEE Security Privacy 8(2), 35-44 (2010)
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
21
-
-
23444459747
-
Secure electronic voting: The current landscape
-
Gritzalis, D. (ed.) Kluwer
-
Lambrinoudakis, C., Gritzalis, D., Tsoumas, V., Karyda, M.: Secure electronic voting: The current landscape. In: Gritzalis, D. (ed.) Secure Electronic Voting, pp. 110-122. Kluwer (2003)
-
(2003)
Secure Electronic Voting
, pp. 110-122
-
-
Lambrinoudakis, C.1
Gritzalis, D.2
Tsoumas, V.3
Karyda, M.4
-
22
-
-
84863927277
-
A risk assessment method for smartphones
-
Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. Springer, Heidelberg
-
Theoharidou, M., Mylonas, A., Gritzalis, D.: A risk assessment method for smartphones. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 443-456. Springer, Heidelberg (2012)
-
(2012)
IFIP AICT
, vol.376
, pp. 443-456
-
-
Theoharidou, M.1
Mylonas, A.2
Gritzalis, D.3
|