-
2
-
-
82655162792
-
Cells: a virtual mobile smartphone architecture
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh. Cells: a virtual mobile smartphone architecture. In SOSP, 2011.
-
(2011)
SOSP
-
-
Andrus, J.1
Dall, C.2
Hof, A. V.3
Laadan, O.4
Nieh, J.5
-
4
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, May 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D. E.1
-
5
-
-
79955570859
-
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
6
-
-
84864866297
-
A survey of mobile malware in the wild
-
A. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In SPSM, 2011.
-
(2011)
SPSM
-
-
Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
8
-
-
85091923085
-
Repriv: Re-imagining content personalization and in-browser privacy
-
S
-
M. Fredrikson and B. Livshits. Repriv: Re-imagining content personalization and in-browser privacy. In S & P, 2011.
-
(2011)
-
-
Fredrikson, M.1
Livshits, B.2
-
10
-
-
84943299684
-
Privad: Practical privacy in online advertising
-
S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In NSDI, 2011.
-
(2011)
NSDI
-
-
Guha, S.1
Cheng, B.2
Francis, P.3
-
11
-
-
38149068982
-
Implementing a multi-hat pda
-
Springer
-
M. Johnson and F. Stajano. Implementing a multi-hat pda. In Security Protocols, pages 295-307. Springer, 2007.
-
(2007)
Security Protocols
, pp. 295-307
-
-
Johnson, M.1
Stajano, F.2
-
12
-
-
58449135488
-
Implicit flows: Can't live with'em, can't live without'em
-
of Springer
-
D. King, B. Hicks, M. Hicks, and T. Jaeger. Implicit flows: Can't live with'em, can't live without'em. volume 5352 of Lecture Notes in Computer Science. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5352
-
-
King, D.1
Hicks, B.2
Hicks, M.3
Jaeger, T.4
-
13
-
-
84863230662
-
Mobicon: a mobile context-monitoring platform
-
Mar
-
Y. Lee, S. S. Iyengar, C. Min, Y. Ju, S. Kang, T. Park, J. Lee, Y. Rhee, and J. Song. Mobicon: a mobile context-monitoring platform. Commun. ACM, 55(3):54-65, Mar. 2012.
-
(2012)
Commun. ACM
, vol.55
, Issue.3
, pp. 54-65
-
-
Lee, Y.1
Iyengar, S. S.2
Min, C.3
Ju, Y.4
Kang, S.5
Park, T.6
Lee, J.7
Rhee, Y.8
Song, J.9
-
14
-
-
73549104415
-
Adding Generic Process Containers to the Linux Kernel
-
June
-
P. B. Menage. Adding Generic Process Containers to the Linux Kernel. In Linux Symposium, June 2007.
-
(2007)
Linux Symposium
-
-
Menage, P. B.1
-
16
-
-
84994345605
-
User-driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. Wang, and C. Cowan. User-driven access control: Rethinking permission granting in modern operating systems. In IEEE S&P, 2012.
-
(2012)
IEEE S&P
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.5
Cowan, C.6
-
17
-
-
77953509182
-
Treasurephone: Context-sensitive user data protection on mobile phones
-
J. Seifert, A. De Luca, B. Conradi, and H. Hussmann. Treasurephone: Context-sensitive user data protection on mobile phones. Pervasive Computing, pages 130-137, 2010.
-
(2010)
Pervasive Computing
, pp. 130-137
-
-
Seifert, J.1
De Luca, A.2
Conradi, B.3
Hussmann, H.4
-
18
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy preserving targeted advertising. In NDSS, 2010.
-
(2010)
NDSS
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
|