-
1
-
-
84885174387
-
-
October
-
Android Open Source Project. Android Security Overview, October 2012. http://source.android.com/tech/security/.
-
(2012)
Android Security Overview
-
-
-
4
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
Oct
-
T. Bläsing, L. Batyuk, A.-D. Schmidt, S. Camtepe, and S. Albayrak. An android application sandbox system for suspicious software detection. In 5th International Conference on Malicious and Unwanted Software (MALWARE), pages 55-62, Oct. 2010.
-
(2010)
5th International Conference on Malicious and Unwanted Software (MALWARE)
, pp. 55-62
-
-
Bläsing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.4
Albayrak, S.5
-
5
-
-
84893816000
-
Exploratory android surgery (talk slides)
-
May
-
J. Burns. Exploratory Android surgery (talk slides). In Black Hat Technical Security Conference USA, May 2009. Available at: https://www.blackhat. com/html/bh-usa-09/bhusa-09-archives.html.
-
(2009)
Black Hat Technical Security Conference USA
-
-
Burns, J.1
-
6
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Berkeley, CA, USA, USENIX Association
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In Proceedings of the 12th USENIX Security Symposium, SSYM'03, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
Proceedings of the 12th USENIX Security Symposium, SSYM'03
-
-
Christodorescu, M.1
Jha, S.2
-
7
-
-
60049085302
-
Understanding android security
-
Jan.-Feb
-
W. Enck, M. Ongtang, and P. McDaniel. Understanding android security. IEEE Security & Privacy, 7(1):50-57, Jan.-Feb. 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
8
-
-
84890845494
-
-
Technical report, Fraunhofer AISEC, May
-
R. Fedler, C. Banse, C. Krauß, and V. Fusenig. Android OS security: Risks and limitations. Technical report, Fraunhofer AISEC, May 2012.
-
(2012)
Android OS Security: Risks and Limitations
-
-
Fedler, R.1
Banse, C.2
Krauß, C.3
Fusenig, V.4
-
15
-
-
70349503911
-
-
Technical report, Information Security Group at Royal Holloway, University of London
-
E. Konstantinou and S. Wolthusen. Metamorphic virus: Analysis and detection. Technical report, Information Security Group at Royal Holloway, University of London, 2009. Available at: http://media.techtarget.com/ searchSecurityUK/downloads/ RH5 Evgenios.pdf.
-
(2009)
Metamorphic Virus: Analysis and Detection
-
-
Konstantinou, E.1
Wolthusen, S.2
-
17
-
-
84893791945
-
-
Linux manual page. inotify(7). Available at: https://www.kernel.org/doc/ manpages/ online/pages/man7/inotify.7.html.
-
Linux Manual Page. Inotify(7)
-
-
-
18
-
-
84865574920
-
-
February
-
H. Lockheimer. Android and security, February 2012. http://googlemobile. blogspot.com/2012/02/androidand-security.html.
-
(2012)
Android and Security
-
-
Lockheimer, H.1
-
19
-
-
84878724863
-
Dissecting the android bouncer
-
June
-
J. Oberheide and C. Miller. Dissecting the Android Bouncer. In SummerCon '12, June 2012. http://jon.oberheide.org/files/summercon12-bouncer.pdf.
-
(2012)
SummerCon '12
-
-
Oberheide, J.1
Miller, C.2
-
20
-
-
84878002579
-
Droidchameleon: Evaluating android anti-malware against transformation attacks
-
ACM
-
V. Rastogi, Y. Chen, and X. Jiang. Droidchameleon: evaluating android anti-malware against transformation attacks. In Proceedings of the 8th ACMSIGSAC symposium on Information, computer and communications security, pages 329-334. ACM, 2013.
-
(2013)
Proceedings of the 8th ACMSIGSAC Symposium on Information, Computer and Communications Security
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
21
-
-
77950675112
-
Google android: A comprehensive security assessment
-
March-April
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. Google android: A comprehensive security assessment. Security Privacy, IEEE, 8(2):35-44, March-April 2010.
-
(2010)
Security Privacy, IEEE
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
23
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
February
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the 19th Network and Distributed System Security Symposium, February 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|