-
1
-
-
84889032714
-
-
[online] Accessed On: 2013-05-19
-
ANDROID. API Differences between 13 and 14. http://developer.android.com/ sdk/api-diff/14/changes.html. [online] Accessed On: 2013-05-19.
-
API Differences between 13 and 14
-
-
-
2
-
-
84889006528
-
-
[online] Accessed On: 2013-05-19
-
ANDROID. API Differences between 14 and 15. http://developer.android.com/ sdk/api-diff/15/changes.html. [online] Accessed On: 2013-05-19.
-
API Differences between 14 and 15
-
-
-
3
-
-
84889010965
-
-
[online] Accessed On: 2013-05-19
-
ANDROID. API Differences between 15 and 16. http://developer.android.com/ sdk/api-diff/16/changes.html. [online] Accessed On: 2013-05-19.
-
API Differences between 15 and 16
-
-
-
4
-
-
84889003260
-
-
[online] Accessed On: 2013-06-20
-
ANDROID. API Differences between 16 and 17. http://developer.android.com/ sdk/api-diff/17/changes.html. [online] Accessed On: 2013-06-20.
-
API Differences between 16 and 17
-
-
-
5
-
-
84889032683
-
-
[online] Accessed On: 2013-08-22
-
ANDROID. Manifest.permission | Android Developers. http://developer. android.com/reference/android/Manifest.permission.html. [online] Accessed On: 2013-08-22.
-
Manifest.permission | Android Developers
-
-
-
6
-
-
84889048406
-
-
[online] Accessed On: 2013-05-19
-
ANDROID. Platforms | Android Developers. http://developer.android.com/ tools/revisions/platforms.html. [online] Accessed On: 2013-05-19.
-
Platforms | Android Developers
-
-
-
7
-
-
84889045756
-
-
[online] Accessed On: 2013-05-19
-
ANDROID. R.attr | Android Developers. http://developer.android.com/ reference/android/R.attr.html#protectionLevel. [online] Accessed On: 2013-05-19.
-
R.attr | Android Developers
-
-
-
8
-
-
84889067913
-
-
[online] Accessed On: 2013-06-13
-
ANDROID. Security Tips (IPC) | Android Developers. http://developer. android.com/training/articles/security-tips.html#IPC. [online] Accessed On: 2013-06-13.
-
Security Tips (IPC) | Android Developers
-
-
-
9
-
-
84889046701
-
-
[online] Accessed On: 2013-05-19
-
ANDROID. Status Notifications | Android Developers. http://developer. android.com/guide/topics/ui/notifiers/notifications.html. [online] Accessed On: 2013-05-19.
-
Status Notifications | Android Developers
-
-
-
10
-
-
80755127060
-
Short Paper: A Look at SmartPhone Permission Models
-
ACM
-
AU, K. W. Y., ZHOU, Y. F., HUANG, Z., GILL, P., AND LIE, D. Short Paper: A Look at SmartPhone Permission Models. In Proceedings of the First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011), SPSM'11, ACM.
-
Proceedings of the First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011), SPSM'11
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
11
-
-
84869388345
-
PScout: Analyzing the Android Permission Specification
-
ACM
-
AU, K. W. Y., ZHOU, Y. F., HUANG, Z., AND LIE, D. PScout: Analyzing the Android Permission Specification. In Proceedings of the 19th ACM Conference on Computer and Communications Security (2012), CCS'12, ACM.
-
Proceedings of the 19th ACM Conference on Computer and Communications Security (2012), CCS'12
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
12
-
-
78649990344
-
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
-
ACM
-
BARRERA, D., VAN OORSCHOT, P., KAYACIK, H., AND SOMAYAJI, A. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android. In Proceedings of the Seventeenth ACM Conference on Computer and Communications Security (2010), CCS'10, ACM.
-
Proceedings of the Seventeenth ACM Conference on Computer and Communications Security (2010), CCS'10
-
-
Barrera, D.1
Van Oorschot, P.2
Kayacik, H.3
Somayaji, A.4
-
13
-
-
84889071038
-
-
Poster: Attitudes to IT-Security When Using a Smartphone
-
BENENSON, Z., HINTZ, N., KROLL-PETERS, O., AND KRUPP, M. Poster: Attitudes to IT-Security When Using a Smartphone. In Eighth Symposium on Usable Privacy and Security (SOUPS) (2012), SOUPS'12.
-
Eighth Symposium on Usable Privacy and Security (SOUPS) (2012), SOUPS'12
-
-
Benenson, Z.1
Hintz, N.2
Kroll-Peters, O.3
Krupp, M.4
-
14
-
-
0030092390
-
Checking for race conditions in file accesses
-
BISHOP, M., AND DILGER, M. Checking for race conditions in file accesses. Computing systems 2, 2 (1996), 131-152.
-
(1996)
Computing Systems 2
, vol.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
16
-
-
84861302816
-
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
-
ACM
-
CHIA, P. H., YAMAMOTO, Y., AND ASOKAN, N. Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals. In Proceedings of the Twenty-First International World Wide Web Conference (2012), WWW'12, ACM.
-
Proceedings of the Twenty-First International World Wide Web Conference (2012), WWW'12
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
17
-
-
84869847480
-
Choice Architecture and Smartphone Privacy: There's A Price for That
-
EGELMAN, S., PORTER FELT, A., AND WAGNER, D. Choice Architecture and Smartphone Privacy: There's A Price for That. In Proceedings of the 11th Annual Workshop on the Economics of Information Security (2012), WEIS'12.
-
Proceedings of the 11th Annual Workshop on the Economics of Information Security (2012), WEIS'12
-
-
Egelman, S.1
Porter Felt, A.2
Wagner, D.3
-
18
-
-
84889050028
-
-
[online] Accessed On: 2013-05-19
-
GOOGLE. weather - Google Play. https://play.google.com/store/search?q= weather&c=apps. [online] Accessed On: 2013-05-19.
-
Weather - Google Play
-
-
-
19
-
-
84867438639
-
A Conundrum of Permissions: Installing Applications on an Android Smartphone
-
KELLEY, P. G., CONSOLVO, S., CRANOR, L. F., JUNG, J., SADEH, N., AND WETHERALL, D. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Proceedings of the Workshop on Usable Security (2012), USEC'12.
-
Proceedings of the Workshop on Usable Security (2012), USEC'12
-
-
Kelley, P.G.1
Consolvo, S.2
Cranor, L.F.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
20
-
-
80755187788
-
Android Permissions Demystified
-
ACM
-
PORTER FELT, A., CHIN, E., HANNA, S., SONG, D., AND WAGNER, D. Android Permissions Demystified. In Proceedings of the Eighteenth ACM Conference on Computer and Communications Security (2011), CCS'11, ACM.
-
Proceedings of the Eighteenth ACM Conference on Computer and Communications Security (2011), CCS'11
-
-
Porter Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
21
-
-
85044855162
-
How to Ask for Permission
-
PORTER FELT, A., EGELMAN, S., FINIFTER, M., AKHAWE, D., AND WAGNER, D. How to Ask for Permission. In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec) 2012 (2012).
-
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec) 2012 (2012)
-
-
Porter Felt, A.1
Egelman, S.2
Finifter, M.3
Akhawe, D.4
Wagner, D.5
-
22
-
-
84888986982
-
-
Tech. rep., University of California, Berkeley
-
PORTER FELT, A., EGELMAN, S., AND WAGNER, D. I've Got 99 Problems, But Vibration Ain't One: A Survery of Smartphone Users' Concerns. Tech. rep., University of California, Berkeley, 2012.
-
(2012)
I've Got 99 Problems, but Vibration Ain't One: A Survery of Smartphone Users' Concerns
-
-
Porter Felt, A.1
Egelman, S.2
Wagner, D.3
-
23
-
-
84865024594
-
Android Permissions: User Attention, Comprehension, and Behavior
-
PORTER FELT, A., HA, E., EGELMAN, S., HANEY, A., CHIN, E., AND WAGNER, D. Android Permissions: User Attention, Comprehension, and Behavior. In Eighth Symposium on Usable Privacy and Security (SOUPS) (2012), SOUPS'12.
-
Eighth Symposium on Usable Privacy and Security (SOUPS) (2012), SOUPS'12
-
-
Porter Felt, A.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
24
-
-
84914175337
-
-
Tech. Rep. RHUL-MA-2013-6, Royal Holloway, University of London, Available from
-
SELLWOOD, J. Sleeping Android: Exploit Through Dormant Permission Requests. Tech. Rep. RHUL-MA-2013-6, Royal Holloway, University of London, 2013. Available from http://www.ma.rhul.ac.uk/static/techrep/2013/MA-2013-06.pdf.
-
(2013)
Sleeping Android: Exploit Through Dormant Permission Requests
-
-
Sellwood, J.1
-
25
-
-
79951899261
-
A Small but Non-negligible Flaw in the Android Permission Scheme
-
IEEE
-
SHIN, W., KWAK, S., KIYOMOTO, S., FUKUSHIMA, K., AND TANAKA, T. A Small but Non-negligible Flaw in the Android Permission Scheme. In Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (2010), POLICY'10, IEEE.
-
Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (2010), POLICY'10
-
-
Shin, W.1
Kwak, S.2
Kiyomoto, S.3
Fukushima, K.4
Tanaka, T.5
-
26
-
-
84864037440
-
Curbing Android Permission Creep
-
VIDAS, T., CHRISTIN, N., AND CRANOR, L. F. Curbing Android Permission Creep. In Proceedings of the Web 2.0 Security and Privacy 2011 (2011), W2SP'11.
-
Proceedings of the Web 2.0 Security and Privacy 2011 (2011), W2SP'11
-
-
Vidas, T.1
Christin, N.2
Cranor, L.F.3
|