-
1
-
-
84876542471
-
From keyloggers to touchloggers: Take the rough with the smooth
-
doi: 10.1016/j.cose.2012.10.002
-
Damopoulos D, Kambourakis G, Gritzalis S (2013) From keyloggers to touchloggers: Take the rough with the smooth. Comput Sec 32(0):102-114. doi: 10.1016/j.cose.2012.10.002. http://www.sciencedirect.com/science/article/pii/ S0167404812001654
-
(2013)
Comput Sec
, vol.32
, pp. 102-114
-
-
Damopoulos, D.1
Kambourakis, G.2
Gritzalis, S.3
-
2
-
-
84894715460
-
-
Android
-
Android (2012) Settings system. http://developer.android.com/reference/ android/provider/Settings.System.html
-
(2012)
Settings System
-
-
-
4
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
doi: 10.1109/MALWARE.2010.5665792
-
Blasing T, Batyuk L, Schmidt AD, Camtepe S, Albayrak S (2010) An android application sandbox system for suspicious software detection. In: 2010 5th International conference on malicious and unwanted software (MALWARE), pp 55-62. doi: 10.1109/MALWARE.2010.5665792
-
(2010)
2010 5th International Conference on Malicious and Unwanted Software (MALWARE)
, pp. 55-62
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.D.3
Camtepe, S.4
Albayrak, S.5
-
5
-
-
80755167433
-
-
Bugiel S, Davi L, Dmitrienko A, Fischer T, Sadeghi A (2011) Xmandroid: A new android evolution to mitigate privilege escalation attacks, Security
-
(2011)
Xmandroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, Security
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.5
-
6
-
-
84255195597
-
Evaluation of anomaly-based ids for mobile devices using machine learning classifiers
-
10.1002/sec.341 10.1002/sec.341
-
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N, Gritzalis S (2012) Evaluation of anomaly-based ids for mobile devices using machine learning classifiers. Secur Commun Networks 5(1):3-14. doi: 10.1002/sec.341
-
(2012)
Secur Commun Networks
, vol.5
, Issue.1
, pp. 3-14
-
-
Damopoulos, D.1
Menesidou, S.A.2
Kambourakis, G.3
Papadaki, M.4
Clarke, N.5
Gritzalis, S.6
-
8
-
-
84872224783
-
Madam: A multi-level anomaly detector for android malware
-
Springer-Verlag Berlin 10.1007/978-3-642-33704-821
-
Dini G, Martinelli F, Saracino A, Sgandurra D (2012) Madam: a multi-level anomaly detector for android malware. In: Proceedings of the 6th international conference on mathematical methods, models and architectures for computer network security: computer network security, MMM-ACNS'12. Springer-Verlag, Berlin, pp 240-253. doi: 10.1007/978-3-642-33704-821
-
(2012)
Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security, MMM-ACNS'12
, pp. 240-253
-
-
Dini, G.1
Martinelli, F.2
Saracino, A.3
Sgandurra, D.4
-
9
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck W, Gilbert P, Chun B, Cox L, Jung J, McDaniel P, Sheth A (2010) Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX conference on operating systems design and implementation, USENIX Association, pp 1-6
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, USENIX Association
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
14
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
10.1145/357369.357374
-
Kemmerer R (1983) Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans Comput Syst (TOCS) 1(3):256-277
-
(1983)
ACM Trans Comput Syst (TOCS)
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.1
-
16
-
-
0015672289
-
A note on the confinement problem
-
10.1145/362375.362389
-
Lampson B (1973) A note on the confinement problem. Commun ACM 16(10):613-615
-
(1973)
Commun ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
18
-
-
77950851532
-
Semantically rich application-centric security in android
-
Ongtang M, McLaughlin S, Enck W, McDaniel P (2009) Semantically rich application-centric security in android. In: Annual computer security applications conference, 2009. ACSAC'09. IEEE pp 340-349
-
(2009)
Annual Computer Security Applications Conference, 2009. ACSAC'09. IEEE
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
19
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
Schlegel R, Zhang K, Zhou X, Intwala M, Kapadia A, Wang X (2011) Soundcomber: a stealthy and context-aware sound trojan for smartphones. In: Proceedings of the network and distributed system security symposium
-
(2011)
Proceedings of the Network and Distributed System Security Symposium
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
20
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
10.1007/s10844-010-0148-x 10.1007/s10844-010-0148-x
-
Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) Andromaly: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161-190. doi: 10.1007/s10844-010-0148-x
-
(2012)
J Intell Inf Syst
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
21
-
-
33645958853
-
New constructive approach to covert channel modeling and channel capacity estimation
-
Wang Z, Lee R (2005) New constructive approach to covert channel modeling and channel capacity estimation. Inf Secur: 498-505
-
(2005)
Inf Secur
, pp. 498-505
-
-
Wang, Z.1
Lee, R.2
-
23
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
USENIX Association Berkeley
-
Yan LK, Yin H (2012) Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX conference on security symposium, Security'12. USENIX Association, Berkeley, pp 29-29. http://dl.acm.org/citation.cfm?id=2. 3627932362822
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
, pp. 29-29
-
-
Yan, L.K.1
Yin, H.2
-
24
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Springer-Verlag Berlin 10.1007/978-3-642-21599-5-7
-
Zhou Y, Zhang X, Jiang X, Freeh VW (2011) Taming information-stealing smartphone applications (on android). In: Proceedings of the 4th international conference on trust and trustworthy computing, TRUST'11. Springer-Verlag, Berlin, pp 93-107. http://dl.acm.org/citation.cfm?id=2.0222452022255
-
(2011)
Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST'11
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|