-
2
-
-
84863954784
-
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
-
Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. Springer, Heidelberg
-
Armando, A., Merlo, A., Migliardi, M., Verderame, L.:Would you mind forking this process? A denial of service attack on Android (and some countermeasures). In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 13-24. Springer, Heidelberg (2012)
-
(2012)
IFIP AICT
, vol.376
, pp. 13-24
-
-
Armando, A.1
Merlo, A.2
Migliardi, M.3
Verderame, L.4
-
3
-
-
70349394182
-
Securing Java with Local Policies
-
Bartoletti, M., Costa, G., Degano, P., Martinelli, F., Zunino, R.: Securing Java with Local Policies. Journal of Object Technology 8(4), 5-32 (2009)
-
(2009)
Journal of Object Technology
, vol.8
, Issue.4
, pp. 5-32
-
-
Bartoletti, M.1
Costa, G.2
Degano, P.3
Martinelli, F.4
Zunino, R.5
-
4
-
-
70449384902
-
Planning and verifying service composition
-
Bartoletti, M., Degano, P., Ferrari, G.L.: Planning and verifying service composition. Journal of Computer Security (JCS) 17(5), 799-837 (2009)
-
(2009)
Journal of Computer Security (JCS)
, vol.17
, Issue.5
, pp. 799-837
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
5
-
-
37149004953
-
Types and effects for resource usage analysis
-
Seidl, H. (ed.) FOSSACS 2007. Springer, Heidelberg
-
Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Types and effects for resource usage analysis. In: Seidl, H. (ed.) FOSSACS 2007. LNCS, vol. 4423, pp. 32-47. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4423
, pp. 32-47
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
Zunino, R.4
-
6
-
-
70349755573
-
Local policies for resource usage analysis
-
Bartoletti, M., Degano, P., Ferrari, G.-L., Zunino, R.: Local policies for resource usage analysis. ACM Transactions on Programming Languages and Systems 31(6), 1-43 (2009)
-
(2009)
ACM Transactions on Programming Languages and Systems
, vol.31
, Issue.6
, pp. 1-43
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
Zunino, R.4
-
7
-
-
1442284573
-
-
Technical report, University of Cambridge
-
Bierman, G.M., Parkinson, M.J., Pitts, A.M.: MJ: An imperative core calculus for Java and Java with effects. Technical report, University of Cambridge (2003)
-
(2003)
MJ: An Imperative Core Calculus for Java and Java with Effects
-
-
Bierman, G.M.1
Parkinson, M.J.2
Pitts, A.M.3
-
8
-
-
80755167433
-
-
Technical Report TR-2011-04, Technische Univ. Darmstadt April
-
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Univ. Darmstadt (April 2011)
-
(2011)
Xmandroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
9
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
Burguera, I., Zurutuza, U., Nadjm-Therani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011 (2011)
-
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011 (2011)
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Therani, S.3
-
11
-
-
79961035117
-
Analyzing inter-application communication in Android
-
ACM, New York
-
Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, pp. 239-252. ACM, New York (2011)
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
12
-
-
84882253377
-
-
Android Developers. Security and permissions, http://developer.android. com/guide/topics/security/security.html
-
Security and Permissions
-
-
-
13
-
-
80755187788
-
Android permissions demystified
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 627-638 (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
15
-
-
0033203773
-
Featherweight Java: A Minimal Core Calculus for Java and GJ
-
Igarashi, A., Pierce, B.C., Wadler, P.: Featherweight Java: A Minimal Core Calculus for Java and GJ. ACM Transactions on Programming Languages and Systems, 132-146 (1999)
-
(1999)
ACM Transactions on Programming Languages and Systems
, pp. 132-146
-
-
Igarashi, A.1
Pierce, B.C.2
Wadler, P.3
-
16
-
-
84862909641
-
Attacks on webview in the android system
-
ACM, New York
-
Luo, T., Hao, H., Du, W., Wang, Y., Yin, H.: Attacks on webview in the android system. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 343-352. ACM, New York (2011)
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011
, pp. 343-352
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
17
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
ACM, New York
-
Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 328-332. ACM, New York (2010)
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
18
-
-
77950851532
-
Semantically rich application-centric security in android
-
Ongtang, M., Mclaughlin, S., Enck, W., Mcdaniel, P.: Semantically rich application-centric security in android. In: ACSAC 2009: Annual Computer Security Applications Conference (2009)
-
ACSAC 2009: Annual Computer Security Applications Conference (2009)
-
-
Ongtang, M.1
Mclaughlin, S.2
Enck, W.3
Mcdaniel, P.4
-
19
-
-
84857164924
-
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
-
Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In: Proceedings of the 18th Annual Network & Distributed System Security Symposium (2011)
-
Proceedings of the 18th Annual Network & Distributed System Security Symposium (2011)
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
20
-
-
77950675112
-
Google android: A comprehensive security assessment
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: A comprehensive security assessment. IEEE Security Privacy 8(2), 35-44 (2010)
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
21
-
-
78649293466
-
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework
-
IEEE Computer Society, Washington, DC
-
Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework. In: Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM 2010, pp. 944-951. IEEE Computer Society, Washington, DC (2010)
-
(2010)
Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM 2010
, pp. 944-951
-
-
Shin, W.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
22
-
-
35048838770
-
History effects and verification
-
Chin, W.-N. (ed.) APLAS 2004. Springer, Heidelberg
-
Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol. 3302, pp. 107-128. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3302
, pp. 107-128
-
-
Skalka, C.1
Smith, S.2
-
23
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
ACM, New York
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, pp. 317-326. ACM, New York (2012)
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
24
-
-
85037359376
-
Taming information-stealing smartphone applications
-
(on android). McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011. Springer, Heidelberg
-
Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011. LNCS, vol. 6740, pp. 93-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6740
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|