-
2
-
-
84898605963
-
-
Android Developers Blog. Avoiding memory leaks. android-developers.blogspot.com/2009/01/avoiding-memory-leaks.html, 2009.
-
(2009)
Avoiding Memory Leaks
-
-
-
3
-
-
85076881255
-
-
Apple iCloud. Find my iPhone, iPad, and Mac. www.apple.com/icloud/features/find-my-iphone.html, 2012.
-
(2012)
Find My iPhone, iPad, and Mac
-
-
-
10
-
-
84977840356
-
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
-
A. M. Dunn, M. Z. Lee, S. Jana, S. Kim, M. Silberstein, Y. Xu, V. Shmatikov, and E. Witchel. Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels. In Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012.
-
(2012)
Proc. Of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Dunn, A.M.1
Lee, M.Z.2
Jana, S.3
Kim, S.4
Silberstein, M.5
Xu, Y.6
Shmatikov, V.7
Witchel, E.8
-
11
-
-
85076928408
-
-
EncFS. www.arg0.net/encfs, 2010.
-
(2010)
-
-
-
12
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
-
(2010)
Proc. Of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
14
-
-
84866520713
-
-
Center for Democracy & Technology
-
Future of Privacy Forum, Center for Democracy & Technology. Best practices for mobile applications developers. www.futureofprivacy.org/wp-content/uploads/Apps-Best-Practices-v-beta.pdf, 2011.
-
(2011)
Best Practices for Mobile Applications Developers
-
-
-
15
-
-
79955951203
-
Keypad: An auditing file system for theft-prone devices
-
R. Geambasu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy. Keypad: An auditing file system for theft-prone devices. In Proc. of the ACM European Conference on Computer Systems (EuroSys), 2011.
-
(2011)
Proc. Of the ACM European Conference on Computer Systems (EuroSys)
-
-
Geambasu, R.1
John, J.P.2
Gribble, S.D.3
Kohno, T.4
Levy, H.M.5
-
17
-
-
85058309135
-
-
Google Inc. MonkeyRunner. developer.android.com/tools/ help/monkeyrunner_concepts.html, 2012.
-
(2012)
MonkeyRunner
-
-
-
18
-
-
85076890673
-
-
Google Inc. Two-step verification. support.google.com/ accounts/bin/topic.py?hl=en&topic=28786, 2012.
-
(2012)
Two-Step Verification
-
-
-
19
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proc. of USENIX Security, 2008.
-
(2008)
Proc. Of USENIX Security
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
20
-
-
85076925645
-
-
Imperva. Consumer password practices. www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf, 2010.
-
(2010)
Consumer Password Practices
-
-
-
21
-
-
85076905153
-
-
Intel Corporation. Laptop security with Intel Anti-Theft technology. www.intel.com/content/www/us/en/architecture- and-technology/anti-theft/anti-theft-general-technology.html, 2012.
-
(2012)
Laptop Security with Intel Anti-Theft Technology
-
-
-
23
-
-
17544370316
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proc. of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2000.
-
(2000)
Proc. Of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
26
-
-
85076919416
-
-
technet
-
Microsoft Corporation. Windows 7 BitLocker executive overview. technet.microsoft.com/en-us/library/dd548341(WS.10) .aspx, 2009.
-
(2009)
Windows 7 BitLocker Executive Overview
-
-
-
27
-
-
85076897539
-
-
Microsoft Corporation. Create strong passwords. www.microsoft.com/security/online-privacy/passwordscreate.aspx, 2012.
-
(2012)
Create Strong Passwords
-
-
-
32
-
-
84894142816
-
-
Ponemon Institute. The lost smartphone problem. www.mcafee.com/us/resources/reports/rp-ponemonlost-smartphone-problem.pdf, 2011.
-
(2011)
The Lost Smartphone Problem
-
-
-
38
-
-
84872108140
-
-
Symantec Corporation. PGP whole disk encryption. www.symantec.com/whole-disk-encryption, 2012.
-
(2012)
PGP Whole Disk Encryption
-
-
-
41
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proc. of USENIX Security, 1999.
-
(1999)
Proc. Of USENIX Security
-
-
Whitten, A.1
Tygar, J.2
-
42
-
-
84871104405
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. Dick, Z. M. Mao, and L. Yang. Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In Proc. of the IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2000.
-
(2000)
Proc. Of the IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis
-
-
Zhang, L.1
Tiwana, B.2
Qian, Z.3
Wang, Z.4
Dick, R.5
Mao, Z.M.6
Yang, L.7
|