-
1
-
-
82655162792
-
Cells: A Virtual Mobile Smartphone Architecture
-
J. Andrus, C. Dall, A. Van't Hof, O. Laadan, and J. Nieh. Cells: A Virtual Mobile Smartphone Architecture. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP '11, 2011.
-
Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP '11, 2011
-
-
Andrus, J.1
Dall, C.2
Van't Hof, A.3
Laadan, O.4
Nieh, J.5
-
2
-
-
84869388345
-
PScout: Analyzing the Android Permission Specification
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. PScout: Analyzing the Android Permission Specification. In Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12, 2012.
-
Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12, 2012
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
3
-
-
78649990344
-
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, 2010.
-
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, 2010
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
4
-
-
84860764042
-
MockDroid: Trading Privacy for Application Functionality on Smartphones
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. MockDroid: Trading Privacy for Application Functionality on Smartphones. In Proceedings of the 12th International Workshop on Mobile Computing Systems and Applications, HotMobile '11, 2011.
-
Proceedings of the 12th International Workshop on Mobile Computing Systems and Applications, HotMobile '11, 2011
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
6
-
-
84888341014
-
Towards Taming Privilege-Escalation Attacks on Android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards Taming Privilege-Escalation Attacks on Android. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
7
-
-
84879543890
-
MAST: Triage for Market-scale Mobile Malware Analysis
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck. MAST: Triage for Market-scale Mobile Malware Analysis. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '13, 2013.
-
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '13, 2013
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
8
-
-
79961035117
-
Analyzing Inter-Application Communication in Android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '11, 2011.
-
Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '11, 2011
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
85180792449
-
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger, and A.-R. Sadeghi. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nurnberger, S.7
Sadeghi, A.-R.8
-
12
-
-
85066347237
-
QUIRE: Lightweight Provenance for Smart Phone Operating Systems
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, 2011.
-
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, 2011
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
13
-
-
84888331381
-
PiOS: Detecting Privacy Leaks in iOS Applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Symposium on Network and Distributed System Security, NDSS '11, 2011.
-
Proceedings of the 18th Annual Symposium on Network and Distributed System Security, NDSS '11, 2011
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
14
-
-
85076889619
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '10, 2010.
-
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '10, 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
15
-
-
85025700509
-
A Study of Android Application Security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, 2011.
-
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, 2011
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
17
-
-
80755187788
-
Android Permissions Demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, 2011.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, 2011
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
18
-
-
85046879731
-
Permission Re-Delegation: Attacks and Defenses
-
A. P. Felt, H. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, 2011.
-
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, 2011
-
-
Felt, A.P.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
19
-
-
84865576227
-
Modeling and Enhancing Android's Permission System
-
E. Fragkaki, L. Bauer, L. Jia, and D. Swasey. Modeling and Enhancing Android's Permission System. In Proceedings of 17th European Symposium on Research in Computer Security, ESORICS '12, 2012.
-
Proceedings of 17th European Symposium on Research in Computer Security, ESORICS '12, 2012
-
-
Fragkaki, E.1
Bauer, L.2
Jia, L.3
Swasey, D.4
-
21
-
-
84888988239
-
-
Google
-
Google. Intent. http://developer.android.com/reference/android/content/ Intent.html.
-
Intent
-
-
-
22
-
-
84874794209
-
-
Google
-
Google. Platform Versions. http://developer.android.com/about/dashboards/ index.html.
-
Platform Versions
-
-
-
23
-
-
84860660623
-
Unsafe Exposure Analysis of Mobile In-App Advertisements
-
M. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe Exposure Analysis of Mobile In-App Advertisements. In Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12, 2012.
-
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12, 2012
-
-
Grace, M.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
24
-
-
85165758676
-
Systematic Detection of Capability Leaks in Stock Android Smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
25
-
-
84864334986
-
RiskRanker: Scalable and Accurate Zero-day Android Malware Detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the 10th International Conference on Mobile Systems, Applications and Services, MobiSys '12, 2012.
-
Proceedings of the 10th International Conference on Mobile Systems, Applications and Services, MobiSys '12, 2012
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
26
-
-
84888985522
-
-
Gsmarena. http://www.gsmarena.com/.
-
Gsmarena
-
-
-
27
-
-
0024089972
-
The Confused Deputy: (or why capabilities might have been invented)
-
22, October
-
N. Hardy. The Confused Deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review, 22, October 1988.
-
(1988)
ACM SIGOPS Operating Systems Review
-
-
Hardy, N.1
-
28
-
-
80755187778
-
These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, 2011.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, 2011
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
32
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In Proceedings of 8th International Symposium on Recent Advances in Intrusion Detection, RAID '05, 2005.
-
Proceedings of 8th International Symposium on Recent Advances in Intrusion Detection, RAID '05, 2005
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
33
-
-
80755143400
-
L4Android: A Generic Operating System Framework for Secure Smartphones
-
M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter. L4Android: A Generic Operating System Framework for Secure Smartphones. In Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM '11, 2011.
-
Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM '11, 2011
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
34
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: Statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12, 2012.
-
Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12, 2012
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
35
-
-
77954487766
-
Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
-
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
36
-
-
84871959049
-
AdDroid: Privilege Separation for Applications and Advertisers in Android
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner. AdDroid: Privilege Separation for Applications and Advertisers in Android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, 2012.
-
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, 2012
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
37
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12, 2012.
-
Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12, 2012
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
39
-
-
84889039720
-
-
A. Russakovskii. http://www.androidpolice.com/2011/10/01/massive- security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others- exposes- phone-numbers-gps-sms-emails-addresses-much- more/.
-
-
-
Russakovskii, A.1
-
40
-
-
84864033989
-
Android Permissions: A Perspective Combining Risks and Benefits
-
B. Sarma, C. Gates, N. Li, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Android Permissions: A Perspective Combining Risks and Benefits. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, 2012.
-
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, 2012
-
-
Sarma, B.1
Gates, C.2
Li, N.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
43
-
-
84889034552
-
CleanOS: Limiting Mobile Data Exposure With Idle Eviction
-
Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. CleanOS: Limiting Mobile Data Exposure With Idle Eviction. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '12, 2012.
-
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '12, 2012
-
-
Tang, Y.1
Ames, P.2
Bhamidipati, S.3
Bijlani, A.4
Geambasu, R.5
Sarda, N.6
-
45
-
-
84889055887
-
-
Wiki. Samsung Galaxy S3. http://en.wikipedia.org/wiki/Samsung-Galaxy-S- III.
-
Samsung Galaxy S3
-
-
-
46
-
-
84877990556
-
AppInk: Watermarking Android Apps for Repackaging Deterrence
-
Z. Wu, X. Zhang, and X. Jiang. AppInk: Watermarking Android Apps for Repackaging Deterrence. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS '13, 2013.
-
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS '13, 2013
-
-
Wu, Z.1
Zhang, X.2
Jiang, X.3
-
49
-
-
84874828789
-
Fast, Scalable Detection of 'Piggybacked' Mobile Applications
-
W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou. Fast, Scalable Detection of 'Piggybacked' Mobile Applications. In Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY '13, 2013.
-
Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY '13, 2013
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
50
-
-
85137132511
-
DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY '12, 2012.
-
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY '12, 2012
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
53
-
-
85172622386
-
Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012.
-
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS '12, 2012
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
54
-
-
85037359376
-
Taming Information-Stealing Smartphone Applications (on Android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming Information-Stealing Smartphone Applications (on Android). In Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST '11, 2011.
-
Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST '11, 2011
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|