-
3
-
-
80755127060
-
Short paper: A look at smartphone permission models
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, P. Gill, and D. Lie, "Short paper: a look at smartphone permission models", in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM'11, 2011, pp. 63-68.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Ser. SPSM'11
, pp. 63-68
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
4
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified", in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS'11, 2011, pp. 627-638.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, Ser. CCS'11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
5
-
-
67650821903
-
Taj: Effective taint analysis of web applications
-
O. Tripp, M. Pistoia, S. J. Fink, M. Sridharan, and O. Weisman, "Taj: effective taint analysis of web applications", in Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation, ser. PLDI'09, 2009, pp. 87-97.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, Ser. PLDI'09
, pp. 87-97
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
-
7
-
-
84893293057
-
-
2012
-
"Android manifest.permission. " http://developer.android.com/ reference/android/Manifest.permission.html 2012.
-
Android Manifest.permission
-
-
-
8
-
-
84893227075
-
-
2012
-
"Android developer: monkeyrunner", http://developer.android. com/guide/developing/tools/monkeyrunner concepts. html, 2012.
-
Android Developer: Monkeyrunner
-
-
-
9
-
-
84893332856
-
-
"Virustotal", http://www.virustotal.com 2012.
-
Virustotal
-
-
-
10
-
-
84874794209
-
-
2012
-
"Platform versions", http://developer.android.com/about/ dashboards/index.html, 2012.
-
Platform Versions
-
-
-
14
-
-
79961035117
-
Analyzing interapplication communication in android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing interapplication communication in android", in Proceedings of the 9th international conference on Mobile systems, applications, and services, ser. MobiSys'11, 2011, pp. 239-252.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, Ser. MobiSys'11
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
15
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification", in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS'09, 2009, pp. 235-245.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, Ser. CCS'09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
16
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android", in Proceedings of the 17th ACM conference on Computer and communications security, ser. CCS'10, 2010, pp. 73-84.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, Ser. CCS'10
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
17
-
-
80755172898
-
The effectiveness of application permissions
-
A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions", in Proceedings of the 2nd USENIX conference on Web application development, ser. WebApps'11, 2011, pp. 7-7.
-
(2011)
Proceedings of the 2nd USENIX Conference on Web Application Development, Ser. WebApps'11
, pp. 7-7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
18
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh, "Cells: a virtual mobile smartphone architecture", in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, ser. SOSP'11, 2011, pp. 173-187.
-
(2011)
Proceedings of the Twenty-third ACM Symposium on Operating Systems Principles, Ser. SOSP'11
, pp. 173-187
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
19
-
-
84860764042
-
Mockdroid: Trading privacy for application functionality on smartphones
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, "Mockdroid: trading privacy for application functionality on smartphones", in Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, ser. HotMobile'11, 2011, pp. 49-54.
-
(2011)
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, Ser. HotMobile'11
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
20
-
-
84888331381
-
Pios: Detecting privacy leaks in ios applications
-
San Diego, California: Internet Society, February
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, "Pios: Detecting privacy leaks in ios applications", in 18th Annual Symposium on Network and Distributed System Security. San Diego, California: Internet Society, February 2011.
-
(2011)
18th Annual Symposium on Network and Distributed System Security
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
21
-
-
85025700509
-
A study of android application security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of android application security", in Proceedings of the 20th USENIX conference on Security, ser. SEC'11, 2011, pp. 21-21.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, Ser. SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
22
-
-
79955904273
-
Scandroid: Automated security certification of android applications
-
A. P. Fuchs, A. Chaudhuri, and J. S. Foster, "Scandroid: Automated security certification of android applications", Tech. Rep.
-
Tech. Rep.
-
-
Fuchs, A.P.1
Chaudhuri, A.2
Foster, J.S.3
-
23
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX, October
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones", in Proceedings of the 9th USENIX Symposium on Operating System Design and Implementation, ser. OSDI'10. USENIX, October 2010.
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating System Design and Implementation, Ser. OSDI'10
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
24
-
-
70349276980
-
Privacy oracle: A system for finding application leaks with black box differential testing
-
J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno, "Privacy oracle: a system for finding application leaks with black box differential testing", in Proceedings of the 15th ACM conference on Computer and communications security, ser. CCS'08, 2008, pp. 279-288.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security, Ser. CCS'08
, pp. 279-288
-
-
Jung, J.1
Sheth, A.2
Greenstein, B.3
Wetherall, D.4
Maganis, G.5
Kohno, T.6
-
25
-
-
84991934426
-
Tightlip: Keeping applications from spilling the beans
-
USENIX, April
-
A. R. Yumerefendi, B. Mickle, and O. P. Cox, "Tightlip: Keeping applications from spilling the beans", in Proceedings of the 4th USENIX Symposium on Networked Systems Design and Implementation, ser. NSDI'07. USENIX, April 2007.
-
(2007)
Proceedings of the 4th USENIX Symposium on Networked Systems Design and Implementation, Ser. NSDI'07
-
-
Yumerefendi, A.R.1
Mickle, B.2
Cox, O.P.3
-
26
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
San Diego, California: Internet Society, February
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang, "Systematic detection of capability leaks in stock android smartphones", in 19th Annual Symposium on Network and Distributed System Security. San Diego, California: Internet Society, February 2012.
-
(2012)
19th Annual Symposium on Network and Distributed System Security
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
27
-
-
85037359376
-
Taming informationstealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, "Taming informationstealing smartphone applications (on android)", in Proceedings of the 4th international conference on Trust and trustworthy computing, ser. TRUST'11, 2011, pp. 93-107.
-
(2011)
Proceedings of the 4th International Conference on Trust and Trustworthy Computing, Ser. TRUST'11
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
-
28
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, "Permission re-delegation: Attacks and defenses", in Proceedings of the 20th USENIX Security Symposium, ser. USENIX'11, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, Ser. USENIX'11
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
29
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
San Francisco, CA, Aug
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach, "Quire: Lightweight provenance for smart phone operating systems", in 20th USENIX Security Symposium, San Francisco, CA, Aug. 2011.
-
(2011)
20th USENIX Security Symposium
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
30
-
-
80755167433
-
Xmandroid: A new android evolution to mitigate privilege escalation attacks
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischera, and A.-R. Sadeghi, "Xmandroid: A new android evolution to mitigate privilege escalation attacks", Technische Universitat Darmstadt, Center for Advanced Security Research, Tech. Rep., 2011.
-
(2011)
Technische Universitat Darmstadt, Center for Advanced Security Research, Tech. Rep.
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischera, T.4
Sadeghi, A.-R.5
-
31
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung, "Vision: automated security validation of mobile apps at app markets", in Proceedings of the second international workshop on Mobile cloud computing and services, ser. MCS'11, 2011, pp. 21-26.
-
(2011)
Proceedings of the Second International Workshop on Mobile Cloud Computing and Services, Ser. MCS'11
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
32
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution", Security and Privacy, IEEE Symposium on, pp. 95-109, 2012.
-
(2012)
Security and Privacy, IEEE Symposium On
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
33
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
San Diego, California: Internet Society, February
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: detecting malicious apps in official and alternative android markets", in 19th Annual Symposium on Network and Distributed System Security. San Diego, California: Internet Society, February 2012.
-
(2012)
19th Annual Symposium on Network and Distributed System Security
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
34
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "Riskranker: scalable and accurate zero-day android malware detection", in Proceedings of the 10th international conference on Mobile systems, applications, and services, ser. MobiSys'12, 2012, pp. 281-294.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Ser. MobiSys'12
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
|