-
2
-
-
84866720156
-
-
Juniper Juniper Networks Tech. Rep.
-
Juniper, "2011 mobile threats report," Juniper Networks, Tech. Rep., 2012.
-
(2012)
2011 Mobile Threats Report
-
-
-
6
-
-
84901201616
-
-
Samsung. (Visited March 2013) Samsung smart tv. [Online]
-
Samsung. (Visited March 2013) Samsung smart tv. [Online]. Available: http://www.samsung.com/us/2012-smart-tv/
-
-
-
-
7
-
-
84901201617
-
-
Sony. (Visited March 2013) Smartwatch. [Online]
-
Sony. (Visited March 2013) Smartwatch. [Online]. Available: http://www.sonymobile.com/us/products/accessories/smartwatch/
-
-
-
-
8
-
-
84901201607
-
-
Google. (Visited March 2013) Google glass. [Online]. Available
-
Google. (Visited March 2013) Google glass. [Online]. Available: http://http://www.google.com/glass/
-
-
-
-
9
-
-
84901201608
-
-
CuteCircuit. (Visited March 2013) T-shirtos: The future is getting closer. [Online]
-
CuteCircuit. (Visited March 2013) T-shirtos: The future is getting closer. [Online]. Available: http://www.cutecircuit.com/tshirtos-the-future-is- getting-closer/
-
-
-
-
10
-
-
84901201609
-
-
(Visited March 2013) Weblink aims to bridge the nagging smartphone-car disconnect. [Online]. Available
-
D. Newcomb. (Visited March 2013) Weblink aims to bridge the nagging smartphone-car disconnect. [Online]. Available: http://www.wired.com/autopia/ 2013/03/weblink-abalta-auto-apps/
-
-
-
Newcomb, D.1
-
11
-
-
84865420460
-
Smartphones and tablets in the hospital environment
-
S. Larner, "Smartphones and tablets in the hospital environment," British J. of Healthcare Management, vol. 18, no. 8, pp. 404-405, 2012.
-
(2012)
British J. of Healthcare Management
, vol.18
, Issue.8
, pp. 404-405
-
-
Larner, S.1
-
12
-
-
84901201610
-
-
IIH. (Visited March 2013) Smart pillbox. [Online]
-
IIH. (Visited March 2013) Smart pillbox. [Online]. Available: http://www.innovatorsinhealth.org/solutions/
-
-
-
-
13
-
-
84870420659
-
Smart wearable systems: Current status and future challenges
-
M. Chan, D. Estve, J.-Y. Fourniols, C. Escriba, and E. Campo, "Smart wearable systems: Current status and future challenges," Artificial Intelligence in Medicine, vol. 56, no. 3, pp. 137-156, 2012.
-
(2012)
Artificial Intelligence in Medicine
, vol.56
, Issue.3
, pp. 137-156
-
-
Chan, M.1
Estve, D.2
Fourniols, J.-Y.3
Escriba, C.4
Campo, E.5
-
14
-
-
84901201600
-
-
(Visited March 2013) Asymco. [Online]. Available
-
H. Dediu, D. Schmidt, and R. Salle. (Visited March 2013) Asymco. [Online]. Available: http://www.asymco.com/
-
-
-
Dediu, H.1
Schmidt, D.2
Salle, R.3
-
15
-
-
84901201601
-
-
(Visited May 2013) Back from the dead: why do 2013's best smartphones have ir blasters? [Online]. Available
-
D. Seifert. (Visited May 2013) Back from the dead: why do 2013's best smartphones have ir blasters? [Online]. Available: http://www.theverge.com/2013/ 4/24/4262074/is-this-the-year-of-the-ir-blaster
-
-
-
Seifert, D.1
-
16
-
-
84863229655
-
Networked wireless sensor data collection: Issues, challenges, and approaches
-
F. Wang and J. Liu, "Networked wireless sensor data collection: Issues, challenges, and approaches," IEEE Commun. Surveys & Tutorials, vol. 13, no. 4, pp. 673-687, 2011.
-
(2011)
IEEE Commun. Surveys & Tutorials
, vol.13
, Issue.4
, pp. 673-687
-
-
Wang, F.1
Liu, J.2
-
17
-
-
84873743210
-
A survey on smart grid communication infrastructures: Motivations, requirements and challenges
-
Y. Yan, Y Qian, H. Sharif, and D. Tipper, "A survey on smart grid communication infrastructures: Motivations, requirements and challenges," IEEE Commun. Surveys & Tutorials, vol. 15, no. 1, pp. 5-20, 2013.
-
(2013)
IEEE Commun. Surveys & Tutorials
, vol.15
, Issue.1
, pp. 5-20
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
18
-
-
70350571016
-
A survey of indoor positioning systems for wireless personal networks
-
Y Gu, A. Lo, and I. Niemegeers, "A survey of indoor positioning systems for wireless personal networks," IEEE Commun. Surveys & Tutorials, vol. 11, no. 1, pp. 13-32, 2009.
-
(2009)
IEEE Commun. Surveys & Tutorials
, vol.11
, Issue.1
, pp. 13-32
-
-
Gu, Y.1
Lo, A.2
Niemegeers, I.3
-
19
-
-
84901201602
-
-
(Visited Agoust 2013) Sony's smarttags could change phone habits. [Online]. Available
-
C. MacManus. (Visited Agoust 2013) Sony's smarttags could change phone habits. [Online]. Available: http://news.cnet.com/8301-17938\- 105-57359901-1/sonys-smarttags-could-change-phone-habits/
-
-
-
MacManus, C.1
-
20
-
-
84867927282
-
Mobicon: Mobile context monitoring platform: Incorporating context-awareness to smartphone-centric personal sensor networks
-
Y Lee, Y Ju, C. Mn, J. Yu, and J. Song, "Mobicon: Mobile context monitoring platform: Incorporating context-awareness to smartphone-centric personal sensor networks," in 9th Annu. IEEE Commun. Society Conf. on Sensor, Mesh and Ad Hoc Commun. and Netw. (SECON 2012), 2012, pp. 109-111.
-
(2012)
9th Annu. IEEE Commun. Society Conf. on Sensor, Mesh and Ad Hoc Commun. and Netw. (SECon 2012)
, pp. 109-111
-
-
Lee, Y.1
Ju, Y.2
Mn, C.3
Yu, J.4
Song, J.5
-
21
-
-
84860889609
-
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
-
D. Kelly, R. Raines, R. Baldwin, M. Grimaila, and B. Mullins, "Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics," IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 579-606, 2012.
-
(2012)
IEEE Commun. Surveys & Tutorials
, vol.14
, Issue.2
, pp. 579-606
-
-
Kelly, D.1
Raines, R.2
Baldwin, R.3
Grimaila, M.4
Mullins, B.5
-
22
-
-
84865434111
-
Future of wireless communication: Radioapps and related security and radio computer framework
-
M. Mueck, V Ivanov, S. Choi, J. Kim, C. Ahn, H. Yang, G. Baldini, and A. Piipponen, "Future of wireless communication: Radioapps and related security and radio computer framework," IEEE Wireless Commun., vol. 19, no. 4, pp. 9-16, 2012.
-
(2012)
IEEE Wireless Commun.
, vol.19
, Issue.4
, pp. 9-16
-
-
Mueck, M.1
Ivanov, V.2
Choi, S.3
Kim, J.4
Ahn, C.5
Yang, H.6
Baldini, G.7
Piipponen, A.8
-
23
-
-
84872068419
-
Evaluating the threat of epidemic mobile malware
-
C. Szongott, B. Henne, and M. Smith, "Evaluating the threat of epidemic mobile malware," in Proc. IEEE 8th Int. Conf. on Wireless and Mobile Computing, Netw. and Commun. (WiMob 2012), 2012, pp. 443-450.
-
(2012)
Proc. IEEE 8th Int. Conf. on Wireless and Mobile Computing, Netw. and Commun. (WiMob 2012)
, pp. 443-450
-
-
Szongott, C.1
Henne, B.2
Smith, M.3
-
24
-
-
84873712223
-
A survey on security for mobile devices
-
La Polla, M. and Martinelli, F. and Sgandurra, D., "A Survey on Security for Mobile Devices," IEEE Commun. Surveys & Tutorials, vol. 15, no. 1, pp. 446-471, 2013.
-
(2013)
IEEE Commun. Surveys & Tutorials
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
25
-
-
84878118656
-
Competing memes propagation on networks: A network science perspective
-
X. Wei, N. C. Valler, B. Prakash, I. Neamtiu, M. Faloutsos, and C. Faloutsos, "Competing memes propagation on networks: A network science perspective," IEEE J. Sel. Areas Commun., vol. 31, no. 6, pp. 1049-1060, 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.6
, pp. 1049-1060
-
-
Wei, X.1
Valler, N.C.2
Prakash, B.3
Neamtiu, I.4
Faloutsos, M.5
Faloutsos, C.6
-
26
-
-
84878309098
-
FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment
-
Fernandes, Earlence and Crispo, Bruno and Conti, Mauro, "FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment," IEEE Trans. Inf. Forens. Security, 2013.
-
(2013)
IEEE Trans. Inf. Forens. Security
-
-
Earlence, F.1
Bruno, C.2
Mauro, C.3
-
27
-
-
84861330060
-
Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead
-
G. Baldini, T. Sturman, A. Biswas, R. Leschhorn, G. Godor, and M. Street, "Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead," IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 355-379, 2012.
-
(2012)
IEEE Commun. Surveys & Tutorials
, vol.14
, Issue.2
, pp. 355-379
-
-
Baldini, G.1
Sturman, T.2
Biswas, A.3
Leschhorn, R.4
Godor, G.5
Street, M.6
-
28
-
-
79961046640
-
Caché: Caching location-enhanced content to improve user privacy
-
S. Amini, J. Lindqvist, J. Hong, J. Lin, E. Toch, and N. Sadeh, "Caché: caching location-enhanced content to improve user privacy," in Proc. 9th Int. Conf. on Mobile systems, applications, and services. ACM, 2011, pp. 197-210.
-
(2011)
Proc. 9th Int. Conf. on Mobile Systems, Applications, and Services. ACM
, pp. 197-210
-
-
Amini, S.1
Lindqvist, J.2
Hong, J.3
Lin, J.4
Toch, E.5
Sadeh, N.6
-
29
-
-
84881178016
-
Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing
-
ACM
-
A. Parate, M.-C. Chiu, D. Ganesan, and B. M. Marlin, "Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing," in Proc. 11th Int. Conf. on Mobile Systems, Applications and Services. ACM, 2013, pp. 83-96.
-
(2013)
Proc. 11th Int. Conf. on Mobile Systems, Applications and Services
, pp. 83-96
-
-
Parate, A.1
Chiu, M.-C.2
Ganesan, D.3
Marlin, B.M.4
-
30
-
-
84864978921
-
Measuring user confidence in smartphone security and privacy
-
March
-
E. Chin, A. P. Felt, V. Sekar, and D. Wagner, "Measuring user confidence in smartphone security and privacy," in Symp. on Usable Privacy and Security. Washington: Advancing Science, Serving Society, March 2012.
-
(2012)
Symp. on Usable Privacy and Security. Washington: Advancing Science, Serving Society
-
-
Chin, E.1
Felt, A.P.2
Sekar, V.3
Wagner, D.4
-
31
-
-
84883582229
-
Biometrics in new era of mobile access control
-
J. Fenske, "Biometrics in new era of mobile access control," Biometric Technology Today, vol. 2012, no. 9, pp. 9-11, 2012.
-
(2012)
Biometric Technology Today
, Issue.9
, pp. 9-11
-
-
Fenske, J.1
-
32
-
-
84855302062
-
Smartphone security limitations: Conflicting traditions
-
New York, NY, USA: ACM
-
N. Husted, H. Saïdi, and A. Gehani, "Smartphone security limitations: conflicting traditions," in Proc. 2011 Workshop on Governance of Technology, Information, and Policies, ser. GTIP '11. New York, NY, USA: ACM, 2011, pp. 5-12.
-
(2011)
Proc. 2011 Workshop on Governance of Technology, Information, and Policies, Ser. GTIP '11
, pp. 5-12
-
-
Husted, N.1
Saïdi, H.2
Gehani, A.3
-
33
-
-
80755181021
-
A survey of mobile malware in the wild
-
New York, NY, USA: ACM
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proc. 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 3-14.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Ser. SPSM '11
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
35
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
DOI 10.1108/02635570810868344
-
D. Shih, B. Lin, H. Chiang, and M. Shih, "Security aspects of mobile phone virus: a critical survey," Industrial Management & Data Systems, vol. 108, no. 4, pp. 478-494, 2008. (Pubitemid 351590943)
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.-H.1
Lin, B.2
Chiang, H.-S.3
Shih, M.-H.4
-
36
-
-
84901187803
-
-
Juniper Juniper Networks Tech. Rep.
-
Juniper, "2013 mobile threats report," Juniper Networks, Tech. Rep., 2013.
-
(2013)
2013 Mobile Threats Report
-
-
-
37
-
-
84901232695
-
-
F-Secure F-Secure, Tech. Rep., April 2012, "http:// www.f-secure.com/ weblog/ archives /MobileThreatReport-Q12012.pdf
-
F-Secure, "Mobile threat report q1 2012," F-Secure, Tech. Rep., April 2012, "http://www.f-secure.com/weblog/archives/MobileThreatReport- Q12012.pdf".
-
Mobile Threat Report q1 2012
-
-
-
38
-
-
84901241345
-
-
McAfee McAfee, Tech. Rep., January
-
McAfee, "Threats report:fourth quarter 2012," McAfee, Tech. Rep., January 2013, http://www.mcafee.com/us/resources/reports/rp-quarterly- threat-q4-2012.pdf.
-
(2013)
Threats Report:fourth Quarter 2012
-
-
-
39
-
-
58949099697
-
Dollars for downloading
-
M. Schipka, "Dollars for downloading," Network Security, vol. 2009, no. 1, pp. 7-11, 2009.
-
(2009)
Network Security
, Issue.1
, pp. 7-11
-
-
Schipka, M.1
-
41
-
-
84901190916
-
-
McAfee McAfee, Tech. Rep., January
-
McAfee, "Threats report:fourth quarter 2010," McAfee, Tech. Rep., January 2011, http://www.mcafee.com/us/resources/reports/rp-quarterly- threat-q4-2010.pdf.
-
(2011)
Threats Report:fourth Quarter 2010
-
-
-
42
-
-
33749663423
-
RFID malware: Design principles and examples
-
DOI 10.1016/j.pmcj.2006.07.008, PII S157411920600040X
-
M. R. Rieback, P. N. Simpson, B. Crispo, and A. S. Tanenbaum, "Rfid malware: Design principles and examples," Pervasive and mobile computing, vol. 2, no. 4, pp. 405-426, 2006. (Pubitemid 44556556)
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.4
, pp. 405-426
-
-
Rieback, M.R.1
Simpson, P.N.D.2
Crispo, B.3
Tanenbaum, A.S.4
-
43
-
-
84863537000
-
Design challenges for secure implantable medical devices
-
New York, NY, USA: ACM
-
W. P. Burleson, S. S. Clark, B. Ransford, and K. Fu, "Design challenges for secure implantable medical devices," in Proc. 49th Design Automation Conf, ser. DAC'12. New York, NY, USA: ACM, 2012, pp. 12-17.
-
(2012)
Proc. 49th Design Automation Conf, Ser. DAC'12
, pp. 12-17
-
-
Burleson, W.P.1
Clark, S.S.2
Ransford, B.3
Fu, K.4
-
44
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W H. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Proc. 29th Annual IEEE Symp. Security and Privacy. USENIX Association, May 2008, pp. 129-142.
-
(2008)
Proc. 29th Annual IEEE Symp. Security and Privacy. USENIX Association
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
45
-
-
84970901426
-
Touchlogger: Inferring keystrokes on touch screen from smartphone motion
-
Berkeley, CA, USA
-
L. Cai and H. Chen, "Touchlogger: inferring keystrokes on touch screen from smartphone motion," in Proc. 6th USENIX conf. on Hot topics in security, ser. HotSec'11, Berkeley, CA, USA, 2011, pp. 9-9.
-
(2011)
Proc. 6th USENIX Conf. on Hot Topics in Security, Ser. HotSec'11
, pp. 9-9
-
-
Cai, L.1
Chen, H.2
-
47
-
-
84901203964
-
-
AV-Test AV Test, Tech. Rep.
-
AV-Test, "Anti-malware solutions for android," AV Test, Tech. Rep., 2012, "http://www.av-test.org/fileadmin/pdf/avtest-2012-02-android- anti-malware-report-english.pdf".
-
(2012)
Anti-malware Solutions for Android
-
-
-
48
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
Mar.
-
M. Egele, T. Scholte, E. Kirda, and C. Kruegel, "A survey on automated dynamic malware-analysis techniques and tools," ACM Comput. Surv., vol. 44, no. 2, pp. 6:1-6:42, Mar. 2012.
-
(2012)
ACM Comput. Surv.
, vol.44
, Issue.2
, pp. 61-642
-
-
Egele, M.1
Scholte, T.2
Kirda, E.3
Kruegel, C.4
-
49
-
-
79952846708
-
Old, new, borrowed, blue-: A perspective on the evolution of mobile platform security architectures
-
ACM
-
K. Kostiainen, E. Reshetova, J.-E. Ekberg, and N. Asokan, "Old, new, borrowed, blue-: a perspective on the evolution of mobile platform security architectures," in Proc. 1st ACM conf. on Data and application security and privacy, ser. CODASPY '11. ACM, 2011, pp. 13-24.
-
(2011)
Proc. 1st ACM Conf. on Data and Application Security and Privacy, Ser. CODASPY '11
, pp. 13-24
-
-
Kostiainen, K.1
Reshetova, E.2
Ekberg, J.-E.3
Asokan, N.4
-
50
-
-
81855220939
-
Defending users against smartphone apps: Techniques and future directions
-
Springer-Verlag
-
W. Enck, "Defending users against smartphone apps: techniques and future directions," in Proc. 7th int. conf. on Information Systems Security, ser. ICISS'11. Springer-Verlag, 2011, pp. 49-70.
-
(2011)
Proc. 7th Int. Conf. on Information Systems Security, Ser. ICISS'11
, pp. 49-70
-
-
Enck, W.1
-
51
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications
-
October
-
L. Batyuk, M. Herpich, S. Camtepe, K. Raddatz, A. Schmidt, and S. Al-bayrak, "Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications," in 6th Int. Conf. on Malicious and Unwanted Software (MALWARE 2011), October 2011, pp. 66-72.
-
(2011)
6th Int. Conf. on Malicious and Unwanted Software (MALWARE 2011)
, pp. 66-72
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S.3
Raddatz, K.4
Schmidt, A.5
Al-Bayrak, S.6
-
52
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
New York, NY, USA: ACM
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung, "Vision: automated security validation of mobile apps at app markets," in Proc. int. workshop on Mobile cloud computing and services, ser. MCS '11. New York, NY, USA: ACM, 2011, pp. 21-26.
-
(2011)
Proc. Int. Workshop on Mobile Cloud Computing and Services, Ser. MCS '11
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
53
-
-
84901201606
-
-
(Visited January 2013) Android and security. [Online]. Available
-
H. Lockheimer. (Visited January 2013) Android and security. [Online]. Available: http://googlemobile.blogspot.com.es/2012/02/android-and-security.html
-
-
-
Lockheimer, H.1
-
54
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets," in Proc. 19th Annu. Network and Distributed System Security Symp. (NDSS), 2012.
-
(2012)
Proc. 19th Annu. Network and Distributed System Security Symp. (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
55
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
ACM
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "Detecting repackaged smartphone applications in third-party android marketplaces," in Proc. 2nd ACM conference on Data and Application Security and Privacy. ACM, 2012, pp. 317-326.
-
(2012)
Proc. 2nd ACM Conference on Data and Application Security and Privacy
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
56
-
-
84901241216
-
-
McAfee McAfee, Tech. Rep., January
-
McAfee, "Threats report:fourth quarter 2011," McAfee, Tech. Rep., January 2012, http://www.mcafee.com/us/resources/reports/rp-quarterly- threat-q4-2011.pdf.
-
(2012)
Threats Report:fourth Quarter 2011
-
-
-
57
-
-
80755127060
-
Short paper: A look at smartphone permission models
-
K. Au, Y. Zhou, Z. Huang, P. Gill, and D. Lie, "Short paper: a look at smartphone permission models," in Proc. 1st ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2011, pp. 63-68.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM
, pp. 63-68
-
-
Au, K.1
Zhou, Y.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
58
-
-
80755172898
-
The effectiveness of application permissions
-
A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in Proc. 2nd USENIX conf. on Web application development, ser. WebApps'11. USENIX Association, 2011, pp. 7-7.
-
(2011)
Proc. 2nd USENIX Conf. on Web Application Development, Ser. WebApps'11. USENIX Association
, pp. 7-7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
59
-
-
80755187788
-
Android permissions demystified
-
Felt, Adrienne Porter and Chin, Erika and Hanna, Steve and Song, Dawn and Wagner, David, "Android permissions demystified," in Proc. 18th ACM conf. on Computer and commun. security. ACM, 2011, pp. 627-638.
-
(2011)
Proc. 18th ACM Conf. on Computer and Commun. Security. ACM
, pp. 627-638
-
-
Adrienne Porter, F.1
Erika, C.2
Steve, H.3
Dawn, S.4
David, W.5
-
60
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
Barrera, David and Kayacik, H Güneş and van Oorschot, Paul C and Somayaji, Anil, "A methodology for empirical analysis of permission-based security models and its application to android," i n Proc. 17th ACM conf. on Computer and communications security. ACM, 2010, pp. 73-84.
-
(2010)
Proc. 17th ACM Conf. on Computer and Communications Security. ACM
, pp. 73-84
-
-
David, B.1
Güneş, K.H.2
Van Oorschot Paul, C.3
Anil, S.4
-
61
-
-
85037073388
-
Privilege escalation attacks on android
-
M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin/Heidelberg
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, "Privilege escalation attacks on android," in Information Security, ser. Lecture Notes in Computer Science, M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds. Springer Berlin/Heidelberg, 2011, vol. 6531, pp. 346-360.
-
(2011)
Information Security, Ser. Lecture Notes in Computer Science
, vol.6531
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
62
-
-
80755127066
-
Delivering secure applications on commercial mobile devices: The case for bare metal hypervisors
-
ACM
-
K. Gudeth, M. Pirretti, K. Hoeper, and R. Buskey, "Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors," in Proc. 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. ACM, 2011, pp. 33-38.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Ser. SPSM '11
, pp. 33-38
-
-
Gudeth, K.1
Pirretti, M.2
Hoeper, K.3
Buskey, R.4
-
63
-
-
80755143400
-
L4android: A generic operating system framework for secure smart-phones
-
New York, NY, USA: ACM
-
M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter, "L4android: a generic operating system framework for secure smart-phones," in Proc. 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 39-50.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Ser. SPSM '11
, pp. 39-50
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
64
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
ACM
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh, "Cells: a virtual mobile smartphone architecture," in Proc. 23rd ACM Symposium on Operating Systems Principles, ser. SOSP '11. ACM, 2011, pp. 173-187.
-
(2011)
Proc. 23rd ACM Symposium on Operating Systems Principles, Ser. SOSP '11
, pp. 173-187
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
65
-
-
84864062248
-
Moses: Supporting operation modes on smartphones
-
New York, NY, USA: ACM
-
G. Russello, M. Conti, B. Crispo, and E. Fernandes, "Moses: supporting operation modes on smartphones," in Proc. 17th ACM symp. on Access Control Models and Technologies, ser. SACMAT '12. New York, NY, USA: ACM, 2012, pp. 3-12.
-
(2012)
Proc. 17th ACM Symp. on Access Control Models and Technologies, Ser. S ACMAT '12
, pp. 3-12
-
-
Russello, G.1
Conti, M.2
Crispo, B.3
Fernandes, E.4
-
66
-
-
84871235494
-
Performance evaluation of para-virtualization on modern mobile phone platform
-
Y. Xu, F. Bruns, E. Gonzalez, S. Traboulsi, A. Mott, and A. Bil-gic, "Performance evaluation of para-virtualization on modern mobile phone platform," in Proc. Int. Conf. on Computer, Electrical, and Systems Science and Engineering, ser. ICCESSE '10. Waset, 2010, pp. 272-280.
-
(2010)
Proc. Int. Conf. on Computer, Electrical, and Systems Science and Engineering, Ser. ICCESSE '10. Waset
, pp. 272-280
-
-
Xu, Y.1
Bruns, F.2
Gonzalez, E.3
Traboulsi, S.4
Mott, A.5
Bil-Gic, A.6
-
67
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. Felt, H. Wang, A. Moshchuk, S. Hanna, and E. Chin, "Permission re-delegation: Attacks and defenses," in Proc. 20th USENIX Security Symp., 2011.
-
(2011)
Proc. 20th USENIX Security Symp.
-
-
Felt, A.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
68
-
-
79961035117
-
Analyzing interapplication communication in android
-
ACM
-
E. Chin, A. Felt, K. Greenwood, and D. Wagner, "Analyzing interapplication communication in android," in Proc. 9th int. conf. on Mobile systems, applications, and services. ACM, 2011, pp. 239-252.
-
(2011)
Proc. 9th Int. Conf. on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A.2
Greenwood, K.3
Wagner, D.4
-
69
-
-
84870151992
-
Crepe: Context-related policy enforcement for android
-
M. Conti, V. Nguyen, and B. Crispo, "Crepe: Context-related policy enforcement for android," Information Security, pp. 331-345, 2011.
-
(2011)
Information Security
, pp. 331-345
-
-
Conti, M.1
Nguyen, V.2
Crispo, B.3
-
70
-
-
80755167433
-
-
Technische Universitat Darmstadt, Tech. Rep.
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A. Sadeghi, "Xmandroid: A new android evolution to mitigate privilege escalation attacks," Technische Universitat Darmstadt, Tech. Rep., 2011.
-
(2011)
Xmandroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.5
-
71
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification," in Proc. 16th ACM conf. on Computer and communications security. ACM, 2009, pp. 235-245.
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security. ACM
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
72
-
-
77950851532
-
Semantically rich application-centric security in android
-
December
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, "Semantically rich application-centric security in android," in Computer Security Applications Conf., 2009. ACSAC '09. Annu., December 2009, pp. 340-349.
-
(2009)
Computer Security Applications Conf., 2009. ACSAC '09. Annu
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
73
-
-
33746453742
-
Using labeling to prevent cross-service attacks against smart phones
-
Detection of Intrusions and Malware and Vulnerability Assessment - Third International Conference, DIMVA 2006, Proceedings
-
C. Mulliner, G. Vigna, D. Dagon, and W. Lee, "Using labeling to prevent cross-service attacks against smart phones," in Detection of Intrusions and Malware and Vulnerability Assessment, ser. Lecture Notes in Computer Science, R. Bschkes and P. Laskov, Eds. Springer Berlin Heidelberg, 2006, vol. 4064, pp. 91-108. (Pubitemid 44124004)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4064
, pp. 91-108
-
-
Mulliner, C.1
Vigna, G.2
Dagon, D.3
Lee, W.4
-
74
-
-
77950673302
-
Securing android-powered mobile devices using selinux
-
A. Shabtai, Y. Fledel, and Y. Elovici, "Securing android-powered mobile devices using selinux," IEEE Security & Privacy, vol. 8, no. 3, pp. 36-44, 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.3
, pp. 36-44
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
75
-
-
77954740912
-
Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform
-
Springer
-
M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert, "Beyond kernel-level integrity measurement: enabling remote attestation for the android platform," in Trust and Trustworthy Computing. Springer, 2010, pp. 1-15.
-
(2010)
Trust and Trustworthy Computing
, pp. 1-15
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
Seifert, J.-P.4
-
76
-
-
74349112208
-
Diffuser: Differentiated user access control on smartphones
-
X. Ni, Z. Yang, X. Bai, A. C. Champion, and D. Xuan, "Diffuser: Differentiated user access control on smartphones," in IEEE 6th Int. Conf. Mobile Adhoc and Sensor Systems, 2009. MASS'09. IEEE, 2009, pp. 1012-1017.
-
(2009)
IEEE 6th Int. Conf. Mobile Adhoc and Sensor Systems, 2009. MASS'09. IEEE
, pp. 1012-1017
-
-
Ni, X.1
Yang, Z.2
Bai, X.3
Champion, A.C.4
Xuan, D.5
-
77
-
-
84901201595
-
-
Boston University, MA USA Tech. Rep.
-
F. Rohrer, Y Zhang, L. Chitkushev, and T. Zlateva, "Poster: Role based access control for android (rbaca)," Boston University, MA USA, Tech. Rep., 2012.
-
(2012)
Poster: Role Based Access Control for Android (Rbaca)
-
-
Rohrer, F.1
Zhang, Y.2
Chitkushev, L.3
Zlateva, T.4
-
78
-
-
33750513188
-
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
-
DOI 10.1016/j.apergo.2006.03.010, PII S000368700600041X
-
S. Kraemer and P. Carayon, "Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists," Applied Ergonomics, vol. 38, no. 2, pp. 143-154, 2007. (Pubitemid 44666662)
-
(2007)
Applied Ergonomics
, vol.38
, Issue.2
, pp. 143-154
-
-
Kraemer, S.1
Carayon, P.2
-
80
-
-
84869811164
-
-
University of Maryland Tech. Rep.
-
J. Jeon, K. Micinski, J. Vaughan, N. Reddy, Y Zhu, J. Foster, and T. Millstein, "Dr. android and mr. hide: Fine-grained security policies on unmodified android," University of Maryland, Tech. Rep., 2011.
-
(2011)
Dr. Android and Mr. Hide: Fine-grained Security Policies on Unmodified Android
-
-
Jeon, J.1
Micinski, K.2
Vaughan, J.3
Reddy, N.4
Zhu, Y.5
Foster, J.6
Millstein, T.7
-
82
-
-
80755127062
-
Practical and lightweight domain isolation on android
-
New York, NY, USA: ACM
-
S. Bugiel, L. Davi, A. Dmitrienko, S. Heuser, A.-R. Sadeghi, and B. Shastry, "Practical and lightweight domain isolation on android," in Proc. 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 51-62.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Ser. SPSM '11
, pp. 51-62
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Heuser, S.4
Sadeghi, A.-R.5
Shastry, B.6
-
83
-
-
84855302062
-
Smartphone security limitations: Conflicting traditions
-
New York, NY, USA: ACM
-
N. Husted, H. Saïdi, and A. Gehani, "Smartphone security limitations: conflicting traditions," in Proc. 2011 Workshop on Governance of Technology, Information, and Policies, ser. GTIP '11. New York, NY, USA: ACM, 2011, pp. 5-12.
-
(2011)
Proc. 2011 Workshop on Governance of Technology, Information, and Policies, Ser. GTIP '11
, pp. 5-12
-
-
Husted, N.1
Saïdi, H.2
Gehani, A.3
-
84
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth, "Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones," in Proc. 9th USENIX conf. on Operating systems design and implementation. USENIX Association, 2010, pp. 1-6.
-
(2010)
Proc. 9th USENIX Conf. on Operating Systems Design and Implementation. USENIX Association
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
85
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, "These aren't the droids you're looking for: retrofitting android to protect data from imperious applications," in Proc. 18th ACM conf. on Computer and communications security. ACM, 2011, pp. 639-652.
-
(2011)
Proc. 18th ACM Conf. on Computer and Communications Security. ACM
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
86
-
-
77950675112
-
Google android: A comprehensive security assessment
-
A. Shabtai, Y Fledel, U. Kanonov, Y Elovici, S. Dolev, and C. Glezer, "Google android: A comprehensive security assessment," IEEE Security & Privacy, vol. 8, no. 2, pp. 35-44, 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
87
-
-
60049085302
-
Understanding android security
-
W. Enck, M. Ongtang, and P. McDaniel, "Understanding android security," IEEE Security & Privacy, vol. 7, no. 1, pp. 50-57, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
88
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA: USENIX Association
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of android application security," in Proc. 20th USENIX conf. on Security, ser. SEC'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 21-21.
-
(2011)
Proc. 20th USENIX Conf. on Security, Ser. SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
89
-
-
84901201598
-
-
Apple. (May 2012) ios security. [Online]
-
Apple. (May 2012) ios security. [Online]. Available: http://images. apple.com/ipad/business/docs/iOS-Security-May12.pdf
-
-
-
-
90
-
-
84901201599
-
-
(Visited May 2013) Data privacy of ios 6 release notes. [Online]. Available
-
D. Chubb. (Visited May 2013) Data privacy of ios 6 release notes. [Online]. Available: http://www.product-reviews.net/2012/06/15/ios-6-release- notes-show-heightened-security/
-
-
-
Chubb, D.1
-
91
-
-
84901201589
-
-
(Visited May 2013) Comparision of ios and android security. [Online]. Available
-
C. Miller. (Visited May 2013) Comparision of ios and android security. [Online]. Available: http://www.accuvant.com/blog/2011/10/20/dr-charlie-miller- compares-security-ios-and-android
-
-
-
Miller, C.1
-
92
-
-
84901201590
-
-
Apple. (Visited May 2013) Apple answers fcc questions. [Online]
-
Apple. (Visited May 2013) Apple answers fcc questions. [Online]. Available: http://www.apple.com/hotnews/apple-ans wers-fcc-questions/
-
-
-
-
93
-
-
84926651513
-
-
Mcrosoft Microsoft Coor-poration, Tech. Rep., December
-
Mcrosoft, "Windows Phone 8 Security Overview," Microsoft Coor-poration, Tech. Rep., December 2012, http://go.microsoft.com/fwlink/? LinkId=266838.
-
(2012)
Windows Phone 8 Security Overview
-
-
-
94
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
C. Fleizach, M. Liljenstam, P. Johansson, G. Voelker, and A. Mehes, "Can you infect me now?: malware propagation in mobile phone networks," in Proc. 2007 ACM workshop on Recurring malcode. ACM, 2007, pp. 61-68.
-
(2007)
Proc. 2007 ACM Workshop on Recurring Malcode. ACM
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.4
Mehes, A.5
-
96
-
-
84901201591
-
-
(Visited May 2013) Samsung devices with support for remote controllers. [Online]. Available
-
L. Auriemma. (Visited May 2013) Samsung devices with support for remote controllers. [Online]. Available: http://aluigi.org/adv/samsux- 1-adv.txt
-
-
-
Auriemma, L.1
-
97
-
-
84901201592
-
-
Sophos. (Visited May 2013) First anti-virus software for connected tv. [Online]
-
Sophos. (Visited May 2013) First anti-virus software for connected tv. [Online]. Available: http://goo.gl/Ww67D
-
-
-
-
98
-
-
38349178199
-
Security and privacy for implantable medical devices
-
January
-
D. Halperin, T. Kohno, T. Heydt-Benjamin, K. Fu, and W. Maisel, "Security and privacy for implantable medical devices," IEEE Pervasive Comput., vol. 7, no. 1, pp. 30-39, January 2008.
-
(2008)
IEEE Pervasive Comput.
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.3
Fu, K.4
Maisel, W.5
-
100
-
-
84901188021
-
-
S. Corporation Visited May 2013
-
S. Corporation, "Symantec security threats," Visited May 2013, http://www.symantec.com/security-response/landing/threats.jsp.
-
Symantec Security Threats
-
-
-
101
-
-
84901200687
-
-
F-Secure Visited May 2013
-
F-Secure, "F-secure mobile threats," Visited May 2013, http://www.f-secure.com/en/web/labs-global/mobile-security.
-
F-secure Mobile Threats
-
-
-
102
-
-
84901201593
-
-
Lookout. (Visited May 2013) Notcompatible. [Online]
-
Lookout. (Visited May 2013) Notcompatible. [Online]. Available: http://goo.gl/yJEgn
-
-
-
-
103
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
New York, NY, USA: ACM
-
P. Traynor, M. Lin, M. Ongtang, V Rao, T. Jaeger, P. McDaniel, and T. La Porta, "On cellular botnets: measuring the impact of malicious devices on a cellular network core," in Proc. 16th ACM conf. on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 223-234.
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security, Ser. CCS '09
, pp. 223-234
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.6
La Porta, T.7
-
104
-
-
84872118819
-
An analysis of the ikee.b iphone botnet
-
A. U. Schmidt, G. Russello, A. Lioy N. R. Prasad, and S. Lian, Eds. Springer, May
-
P. A. Porras, H. Saidi, and V Yegneswaran, "An analysis of the ikee.b iphone botnet," in Security and Privacy in Mobile Information and Communication Systems (MobiSec), 2nd Int. ICST Conf, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, A. U. Schmidt, G. Russello, A. Lioy N. R. Prasad, and S. Lian, Eds., vol. 47. Springer, May 2010, pp. 141-152.
-
(2010)
Security and Privacy in Mobile Information and Communication Systems (MobiSec), 2nd Int. ICST Conf, Ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.47
, pp. 141-152
-
-
Porras, P.A.1
Saidi, H.2
Yegneswaran, V.3
-
105
-
-
78651392844
-
Rise of the iBots: 0wning a telco network
-
Nancy, France, October
-
C. Mulliner and J.-P. Seifert, "Rise of the iBots: 0wning a telco network," in Proc. 5th IEEE Int. Conf. Malicious and Unwanted Software (Malware), Nancy, France, October 2010, pp. 71-80.
-
(2010)
Proc. 5th IEEE Int. Conf. Malicious and Unwanted Software (Malware)
, pp. 71-80
-
-
Mulliner, C.1
Seifert, J.-P.2
-
106
-
-
85084094893
-
Andbot: Towards advanced mobile botnets
-
Berkeley, CA, USA: USENIX Association
-
C. Xiang, F. Binxing, Y Lihua, L. Xiaoyi, and Z. Tianning, "Andbot: towards advanced mobile botnets," in Proc. 4th USENIX conf. on Large-scale exploits and emergent threats, ser. LEET'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 11-11.
-
(2011)
Proc. 4th USENIX Conf. on Large-scale Exploits and Emergent Threats, Ser. LEET'11
, pp. 11-11
-
-
Xiang, C.1
Binxing, F.2
Lihua, Y.3
Xiaoyi, L.4
Tianning, Z.5
-
107
-
-
79960864204
-
Isam: An iphone stealth airborne malware
-
J. Camenisch, S. Fischer-Hbner, Y Murayama, A. Portmann, and C. Rieder, Eds. Springer Berlin Heidelberg
-
D. Damopoulos, G. Kambourakis, and S. Gritzalis, "isam: An iphone stealth airborne malware," in Future Challenges in Security and Privacy for Academia and Industry, ser. IFIP Advances in Information and Communication Technology, J. Camenisch, S. Fischer-Hbner, Y Murayama, A. Portmann, and C. Rieder, Eds. Springer Berlin Heidelberg, 2011, vol. 354, pp. 17-28.
-
(2011)
Future Challenges in Security and Privacy for Academia and Industry, Ser. IFIP Advances in Information and Communication Technology
, vol.354
, pp. 17-28
-
-
Damopoulos, D.1
Kambourakis, G.2
Gritzalis, S.3
-
108
-
-
84901201594
-
-
S. Ldt Visited May 2013
-
S. Ldt, "Sophos endpoint protection," Visited May 2013, http://www.sophos.com.
-
Sophos Endpoint Protection
-
-
-
110
-
-
84862909641
-
Attacks on WebView in the android system
-
ACM
-
Luo, Tongbo and Hao, Hao and Du, Wenliang and Wang, Yifei and Yin, Heng, "Attacks on WebView in the Android system," in Proc. 27th Annu. Computer Security Applications Conf. ACM, 2011, pp. 343-352.
-
(2011)
Proc. 27th Annu. Computer Security Applications Conf
, pp. 343-352
-
-
Tongbo, L.1
Hao, H.2
Wenliang, D.3
Yifei, W.4
Heng, Y.5
-
111
-
-
84901241538
-
-
NakedSecurity Visited May 2013
-
NakedSecurity, "Malicious cloned games attack google android market," Visited May 2013, http://nakedsecurity.sophos.com/2011/12/12/ malicious-cloned-games-attack-google-android-market/.
-
Malicious Cloned Games Attack Google Android Market
-
-
-
113
-
-
84901201582
-
-
Skycure. (Visited May 2013) Malicious Profiles-The Sleeping Giant of iOS Security. [Online]. Available: \textcolor{black}{
-
Skycure. (Visited May 2013) Malicious Profiles-The Sleeping Giant of iOS Security. [Online]. Available: \textcolor{black}{http://blog. skycure.com/2013/03/malicious-profiles-sleeping-giant-of.html}
-
-
-
-
116
-
-
77951566629
-
Rootk-its on smart phones: Attacks, implications and opportunities
-
New York, NY, USA: ACM
-
J. Bickford, R. O'Hare, A. Baliga, V Ganapathy, and L. Iftode, "Rootk-its on smart phones: attacks, implications and opportunities," in Proc. 11th Workshop on Mobile Computing Systems &38; Applications, ser. HotMobile '10. New York, NY, USA: ACM, 2010, pp. 49-54.
-
(2010)
Proc. 11th Workshop on Mobile Computing Systems &38; Applications, Ser. HotMobile '10
, pp. 49-54
-
-
Bickford, J.1
O'Hare, R.2
Baliga, A.3
Ganapathy, V.4
Iftode, L.5
-
117
-
-
84901201584
-
-
National University of Computer & Emerging Sciences, Islamabad, Pakistan, Tech. Rep.
-
F. Shahzad, M. A. Akbar, and M. Farooq, "A survey on recent advances in malicious applications analysis and detection techniques for smartphones," National University of Computer & Emerging Sciences, Islamabad, Pakistan, Tech. Rep., 2012.
-
(2012)
A Survey on Recent Advances in Malicious Applications Analysis and Detection Techniques for Smartphones
-
-
Shahzad, F.1
Akbar, M.A.2
Farooq, M.3
-
118
-
-
84901201585
-
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
-
in Press
-
G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. B. Alis, "Dendroid: A text mining approach to analyzing and classifying code structures in android malware families," Expert Systems with Applications, 2013, in Press.
-
(2013)
Expert Systems with Applications
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris-Lopez, P.3
Alis, J.B.4
-
119
-
-
4344659702
-
Anomaly detection methods in wired networks: A survey and tax-onomy
-
J. M. Estévez-Tapiador, P. Garcia-Teodoro, and J. E. Díaz-Verdejo, "Anomaly detection methods in wired networks: a survey and tax-onomy," Computer Communications, vol. 27, no. 16, pp. 1569-1584, 2004.
-
(2004)
Computer Communications
, vol.27
, Issue.16
, pp. 1569-1584
-
-
Estévez-Tapiador, J.M.1
Garcia-Teodoro, P.2
Díaz-Verdejo, J.E.3
-
120
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcia-Teodoro, J. E. Díaz-Verdejo, G. Maciá- Fernández, and E. Vázquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges," Computers & Security, vol. 28, no. 1-2, pp. 18-28, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Díaz-Verdejo, J.E.2
MacIá-Fernández, G.3
Vázquez, E.4
-
121
-
-
84881318183
-
Survey of context provisioning middleware
-
M. Knappmeyer, S. L. Kiani, E. S. Reetz, N. Baker, and R. Tonjes, "Survey of context provisioning middleware," IEEE Commun. Surveys & Tutorials, vol. 15, no. 3, pp. 1492-1519, 2013.
-
(2013)
IEEE Commun. Surveys & Tutorials
, vol.15
, Issue.3
, pp. 1492-1519
-
-
Knappmeyer, M.1
Kiani, S.L.2
Reetz, E.S.3
Baker, N.4
Tonjes, R.5
-
123
-
-
84874835750
-
Appprofiler: A flexible method of exposing privacy-related behavior in android applications to end users
-
S. Rosen, Z. Qian, and Z. M. Mao, "Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users," in Proc. 3rd ACM conference on Data and application security and privacy. ACM, 2013, pp. 221-232.
-
(2013)
Proc. 3rd ACM Conference on Data and Application Security and Privacy. ACM
, pp. 221-232
-
-
Rosen, S.1
Qian, Z.2
Mao, Z.M.3
-
124
-
-
84874865861
-
Appsplayground: Automatic security analysis of smartphone applications
-
V. Rastogi, Y. Chen, and W. Enck, "Appsplayground: automatic security analysis of smartphone applications," in Proc. 3rd ACM conference on Data and application security and privacy. ACM, 2013, pp. 209-220.
-
(2013)
Proc. 3rd ACM Conference on Data and Application Security and Privacy. ACM
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
125
-
-
85046801478
-
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
-
S. Zonouz, A. Houmansadr, R. Berthier, N. Borisov, and W. Sanders, "Secloud: A cloud-based comprehensive and lightweight security solution for smartphones," Computers & Security, 2013.
-
(2013)
Computers & Security
-
-
Zonouz, S.1
Houmansadr, A.2
Berthier, R.3
Borisov, N.4
Sanders, W.5
-
126
-
-
84901201586
-
-
National University of Computer & Emerging Sciences, Islamabad, Pakistan Tech. Rep.
-
F. Shahzad, M. Akbar, S. Khan, and M. Farooq, "Tstructdroid: Realtime malware detection using in-execution dynamic analysis of kernel process control blocks on android," National University of Computer & Emerging Sciences, Islamabad, Pakistan, Tech. Rep., 2013.
-
(2013)
Tstructdroid: Realtime Malware Detection Using In-execution Dynamic Analysis of Kernel Process Control Blocks on Android
-
-
Shahzad, F.1
Akbar, M.2
Khan, S.3
Farooq, M.4
-
127
-
-
84856225193
-
Andro-maly": A behavioral malware detection framework for android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ""andro-maly": a behavioral malware detection framework for android devices," J. of Intelligent Information Systems, vol. 38, pp. 161-190, 2012.
-
(2012)
J. of Intelligent Information Systems
, vol.38
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
128
-
-
84872351831
-
-
Universitats-und Landesbibliothek, Postfach 151141, 66041 Saarbracken, Tech. Rep.
-
M. Backes, S. Gerling, C. Hammer, M. Maffei, and P. Styp-Rekowsky, "Appguard real-time policy enforcement for third-party applications," Universitats-und Landesbibliothek, Postfach 151141, 66041 Saarbracken, Tech. Rep., 2012. [Online]. Available: http://scidok.sulb.uni-saarland.de/volltexte/ 2012/4902
-
(2012)
Appguard real-time Policy Enforcement for Third-party Applications
-
-
Backes, M.1
Gerling, S.2
Hammer, C.3
Maffei, M.4
Styp-Rekowsky, P.5
-
129
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: behavior-based malware detection system for android," in 1st ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2011, pp. 15-26.
-
(2011)
1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
130
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
L. Yan and H. Yin, "Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis," in Proc. 21st USENIX conf. on Security symp. USENIX Association, 2012, pp. 29-29.
-
(2012)
Proc. 21st USENIX Conf. on Security Symp. USENIX Association
, pp. 29-29
-
-
Yan, L.1
Yin, H.2
-
131
-
-
84872224783
-
Madam: A multi-level anomaly detector for android malware
-
Springer-Verlag
-
G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, "Madam: a multi-level anomaly detector for android malware," in Proc. 6th int. conf. on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security, ser. MMM-ACNS'12. Springer-Verlag, 2012, pp. 240-253.
-
(2012)
Proc. 6th Int. Conf. on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security, Ser. MMM-ACNS'12
, pp. 240-253
-
-
Dini, G.1
Martinelli, F.2
Saracino, A.3
Sgandurra, D.4
-
132
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Using probabilistic generative models for ranking risks of android apps," in Proc. 2012 ACM conf. on Computer and communications security. ACM, 2012, pp. 241-252.
-
(2012)
Proc. 2012 ACM Conf. on Computer and Communications Security. ACM
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
133
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
ACM
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "Riskranker: scalable and accurate zero-day android malware detection," in Proc. 10th int. conf. on Mobile systems, applications, and services. ACM, 2012, pp. 281-294.
-
(2012)
Proc. 10th Int. Conf. on Mobile Systems, Applications, and Services
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
134
-
-
84869757378
-
Smartdroid: An automatic system for revealing ui-based trigger conditions in android applications
-
C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou, "Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications," in Proc. 2nd ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2012, pp. 93-104.
-
(2012)
Proc. 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM
, pp. 93-104
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Han, X.6
Zou, W.7
-
135
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang, "Systematic detection of capability leaks in stock android smartphones," in Proc. 19th Annu. Symp. on Network and Distributed System Security, 2012.
-
(2012)
Proc. 19th Annu. Symp. on Network and Distributed System Security
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
136
-
-
84888331381
-
Pios: Detecting privacy leaks in ios applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, "Pios: Detecting privacy leaks in ios applications," in Proc. Network and Distributed System Security Symp., 2011.
-
(2011)
Proc. Network and Distributed System Security Symp.
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
138
-
-
84901196269
-
-
Virginia Polytechnic Institute and State University Tech. Rep.
-
K. O. Elish, D. D. Yao, B. G. Ryder, and X. Jiang, "A static assurance analysis of android applications," Virginia Polytechnic Institute and State University, Tech. Rep., 2013.
-
(2013)
A Static Assurance Analysis of Android Applications
-
-
Elish, K.O.1
Yao, D.D.2
Ryder, B.G.3
Jiang, X.4
-
139
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, "Chex: statically vetting android apps for component hijacking vulnerabilities," in Proc. 2012 ACM conf. on Computer and communications security. ACM, 2012, pp. 229-240.
-
(2012)
Proc. 2012 ACM Conf. on Computer and Communications Security. ACM
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
140
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
T. Blasing, L. Batyuk, A. Schmidt, S. Camtepe, and S. Albayrak, "An android application sandbox system for suspicious software detection," in 5th Int. Conf. on Malicious and Unwanted Software (MALWARE 2010). IEEE, 2010, pp. 55-62.
-
(2010)
5th Int. Conf. on Malicious and Unwanted Software (MALWARE 2010). IEEE
, pp. 55-62
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.3
Camtepe, S.4
Albayrak, S.5
-
141
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid android: versatile protection for smartphones," in Proc. 26th Annu. Computer Security Applications Conf., 2010, pp. 347-356.
-
(2010)
Proc. 26th Annu. Computer Security Applications Conf.
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
142
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM
-
H. Kim, J. Smith, and K. Shin, "Detecting energy-greedy anomalies and mobile malware variants," in Proc. 6th int. conf. on Mobile systems, applications, and services. ACM, 2008, pp. 239-252.
-
(2008)
Proc. 6th Int. Conf. on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.3
-
144
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, "Clonecloud: elastic execution between mobile device and cloud," in Proc. 6th conf. on Computer systems, 2011, pp. 301-314.
-
(2011)
Proc. 6th Conf. on Computer Systems
, pp. 301-314
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
145
-
-
84861596582
-
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
-
S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, "Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM). IEEE, 2012, pp. 945-953.
-
(2012)
Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM). IEEE
, pp. 945-953
-
-
Kosta, S.1
Aucinas, A.2
Hui, P.3
Mortier, R.4
Zhang, X.5
-
147
-
-
84865590234
-
Attack of the clones: Detecting cloned applications on android markets
-
J. Crussell, C. Gibler, and H. Chen, "Attack of the clones: Detecting cloned applications on android markets," Computer Security-ESORICS 2012, pp. 37-54, 2012.
-
(2012)
Computer Security-ESORICS 2012
, pp. 37-54
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
149
-
-
84874828789
-
Fast, scalable detection of piggybacked mobile applications
-
W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou, "Fast, scalable detection of piggybacked mobile applications," in Proc. 3rd ACM conf. on Data and application security and privacy. ACM, 2013, pp. 185-196.
-
(2013)
Proc. 3rd ACM Conf. on Data and Application Security and Privacy. ACM
, pp. 185-196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
150
-
-
84888999727
-
Juxtapp: A scalable system for detecting code reuse among android applications
-
S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song, "Juxtapp: A scalable system for detecting code reuse among android applications," in Proc. 9th Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, 2012.
-
(2012)
Proc. 9th Conf. on Detection of Intrusions and Malware & Vulnerability Assessment
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
151
-
-
78650032454
-
Return-oriented programming without returns
-
A. Keromytis and V. Shmatikov, Eds. ACM Press, Oct.
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, "Return-oriented programming without returns," in Proc. of CCS 2010, A. Keromytis and V. Shmatikov, Eds. ACM Press, Oct. 2010, pp. 559-72.
-
(2010)
Proc. of CCS 2010
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
152
-
-
79956032720
-
Ropdefender: A detection tool to defend against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy, "Ropdefender: A detection tool to defend against return-oriented programming attacks," in Proc. 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 40-51.
-
(2011)
Proc. 6th ACM Symposium on Information, Computer and Communications Security. ACM
, pp. 40-51
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
153
-
-
84875215273
-
Design and analysis of a social botnet
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "Design and analysis of a social botnet," Computer Networks, vol. 57, no. 2, pp. 556-578, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.2
, pp. 556-578
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
154
-
-
85084163318
-
Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning
-
F. Yamaguchi, F. Lindner, and K. Rieck, "Vulnerability extrapolation: assisted discovery of vulnerabilities using machine learning," in Proc. 5th USENIX conference on Offensive technologies. USENIX Association, 2011, pp. 13-13.
-
(2011)
Proc. 5th USENIX Conference on Offensive Technologies. USENIX Association
, pp. 13-13
-
-
Yamaguchi, F.1
Lindner, F.2
Rieck, K.3
-
155
-
-
0034508863
-
Collaborative reputation mechanisms for electronic marketplaces
-
DOI 10.1016/S0167-9236(00)00084-1
-
G. Zacharia, A. Moukas, and P. Maes, "Collaborative reputation mechanisms for electronic marketplaces," Decision Support Systems, vol. 29, no. 4, pp. 371-388, 2000. (Pubitemid 32034316)
-
(2000)
Decision Support Systems
, vol.29
, Issue.4
, pp. 371-388
-
-
Zacharia, G.1
Moukas, A.2
Maes, P.3
-
156
-
-
84864579042
-
A survey of trust in workflows and relevant contexts
-
W. Viriyasitavat and A. Martin, "A survey of trust in workflows and relevant contexts," IEEE Commun. Surveys & Tutorials, vol. 14, no. 3, pp. 911-940, 2012.
-
(2012)
IEEE Commun. Surveys & Tutorials
, vol.14
, Issue.3
, pp. 911-940
-
-
Viriyasitavat, W.1
Martin, A.2
-
157
-
-
84861334371
-
Trust computations and trust dynamics in mobile adhoc networks: A survey
-
K. Govindan and P. Mohapatra, "Trust computations and trust dynamics in mobile adhoc networks: A survey," IEEE Commun. Surveys & Tutorials, vol. 14, no. 2, pp. 279-298, 2012.
-
(2012)
IEEE Commun. Surveys & Tutorials
, vol.14
, Issue.2
, pp. 279-298
-
-
Govindan, K.1
Mohapatra, P.2
-
158
-
-
77951609662
-
I am a sensor, and i approve this message
-
HotMobile '10. New York, NY, USA: ACM
-
S. Saroiu and A. Wolman, "I am a sensor, and i approve this message," in Proc. 11th Workshop on Mobile Computing Systems & Applications, ser. HotMobile '10. New York, NY, USA: ACM, 2010, pp. 37-42.
-
(2010)
Proc. 11th Workshop on Mobile Computing Systems & Applications, ser
, pp. 37-42
-
-
Saroiu, S.1
Wolman, A.2
-
159
-
-
84901201587
-
A comprehensive study for rfid malwares on mobile devices
-
January
-
Q. Yan, Y. Li, T. Li, and R. Deng, "A comprehensive study for rfid malwares on mobile devices," in 5th Workshop on RFID Security (RFIDsec 2009 Asia), January 2009.
-
(2009)
5th Workshop on RFID Security (RFIDsec 2009 Asia)
-
-
Yan, Q.1
Li, Y.2
Li, T.3
Deng, R.4
-
160
-
-
84869598656
-
Recent results in computer security for medical devices
-
Springer Berlin Heidelberg
-
S. S. Clark and K. Fu, "Recent results in computer security for medical devices," in Wireless Mobile Communication and Healthcare, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 83. Springer Berlin Heidelberg, 2012, pp. 111-118.
-
(2012)
Wireless Mobile Communication and Healthcare, Ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.83
, pp. 111-118
-
-
Clark, S.S.1
Fu, K.2
-
162
-
-
85092017530
-
Take two software updates and see me in the morning: The case for software security evaluations of medical devices
-
Aug.
-
S. Hanna, R. Rolles, A. Molina-Markham, P. Poosankam, K. Fu, and D. Song, "Take two software updates and see me in the morning: The case for software security evaluations of medical devices," in Proc. 2nd USENIX Workshop on Health Security and Privacy (HealthSec). USENIX Association, Aug. 2011, pp. 6-6.
-
(2011)
Proc. 2nd USENIX Workshop on Health Security and Privacy (HealthSec). USENIX Association
, pp. 6-6
-
-
Hanna, S.1
Rolles, R.2
Molina-Markham, A.3
Poosankam, P.4
Fu, K.5
Song, D.6
-
163
-
-
84901201588
-
-
WhatsApp. (Visited March 2013) Legal info. [Online]. Available
-
WhatsApp. (Visited March 2013) Legal info. [Online]. Available: http://www.whatsapp.com/legal/?l=en-en
-
-
-
-
164
-
-
84901201579
-
-
Google. (Visited May 2013) Google app engine. [Online]. Available
-
Google. (Visited May 2013) Google app engine. [Online]. Available: www.google.com/enterprise/cloud/appengine
-
-
-
-
165
-
-
77955344280
-
Android anti-forensics through a local paradigm
-
A. Distefano, G. Me, and F. Pace, "Android anti-forensics through a local paradigm," Digital Investigation, vol. 7, Supplement, pp. S83-S94, 2010.
-
(2010)
Digital Investigation
, vol.7
, Issue.SUPPL.
-
-
Distefano, A.1
Me, G.2
Pace, F.3
|