-
2
-
-
84902290896
-
-
accessed 14 April 2013
-
O. Hou, 2012, "A Look at Google Bouncer", http://blog. trendmicro.com/trendlabs-security-intelligence/a-look-at-google-bouncer/, accessed 14 April 2013
-
(2012)
A Look at Google Bouncer
-
-
Hou, O.1
-
4
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang & V. Freeh, "Taming information-stealing smartphone applications (on Android)", TRUST 2011, pp. 93-107.
-
TRUST 2011
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
-
5
-
-
77950675112
-
Google android: A comprehensive security assessment
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev & C. Glezer, "Google Android: A Comprehensive Security Assessment", IEEE Security & Privacy Magazine, Vol. 8, no. 2, 2012, pp. 35-44.
-
(2012)
IEEE Security & Privacy Magazine
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
8
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin & D. Wagner, "Android permissions: User attention, comprehension, and behavior", SOUPS 2012, p. 3.
-
SOUPS 2012
, pp. 3
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
9
-
-
84868375110
-
A conundrum of permissions: Installing applications on an android smartphone
-
P.G. Kelley, S. Consolvo, L.F. Cranor, J. Jung, N. Sadeh & D. Wetherall, "A Conundrum of Permissions: Installing Applications on an Android Smartphone", Financial Cryptography and Data Security 2012, pp. 68-79.
-
(2012)
Financial Cryptography and Data Security
, pp. 68-79
-
-
Kelley, P.G.1
Consolvo, S.2
Cranor, L.F.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
10
-
-
84881416894
-
Permission tracking in android
-
M. Kern, & J. Sametinger, "Permission Tracking in Android", UBICOMM 2012, pp. 148-155.
-
UBICOMM 2012
, pp. 148-155
-
-
Kern, M.1
Sametinger, J.2
-
12
-
-
84860764042
-
MockDroid: Trading privacy for application functionality on smartphones
-
AR. Beresford, A. Rice, N. Skehin & R. Sohan, "MockDroid: trading privacy for application functionality on smartphones", HotMobile 2011, pp. 49-54.
-
HotMobile 2011
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
13
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter & D. Wetherall, "These aren't the droids you're looking for: retrofitting android to protect data from imperious applications", ACM CCS 2011, pp. 639-652.
-
ACM CCS 2011
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
14
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.G. Chun, L.P. Cox, J. Jung, P. McDaniel & A.N. Sheth, "TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones", 9th USENIX conference on Operating systems design and implementation, 2012, pp. 1-6.
-
(2012)
9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
16
-
-
84869458610
-
Repackaging android applications for auditing access to private data
-
P. Berthome, T. Fecherolle, N. Guilloteau & J.F. Lalande, "Repackaging Android Applications for Auditing Access to Private Data", ARES 2012, pp. 388-396.
-
ARES 2012
, pp. 388-396
-
-
Berthome, P.1
Fecherolle, T.2
Guilloteau, N.3
Lalande, J.F.4
-
17
-
-
84866433973
-
Android malware forensics: Reconstruction of malicious events
-
L. Juanru, G. Dawu & L. Yuhao, "Android Malware Forensics: Reconstruction of Malicious Events", ICDCSW 2012, pp. 552-558.
-
ICDCSW 2012
, pp. 552-558
-
-
Juanru, L.1
Dawu, G.2
Yuhao, L.3
-
19
-
-
84902287791
-
-
accessed 11 April 2013
-
http://apkmultitool.com/, accessed 11 April 2013
-
-
-
-
20
-
-
84902243515
-
-
accessed 11 April 2013
-
http://code.google.com/p/smali/, accessed 11 April 2013
-
-
-
-
21
-
-
84902254062
-
-
accessed 11 April 2013
-
http://java.decompiler.free.fr/?q=jdgui, accessed 11 April 2013
-
-
-
-
22
-
-
84863587187
-
A framework for static detection of privacy leaks in android applications
-
C. Mann & A Starostin, "A framework for static detection of privacy leaks in android applications", ACM SAC 2012, pp. 1457-1462.
-
ACM SAC 2012
, pp. 1457-1462
-
-
Mann, C.1
Starostin, A.2
-
23
-
-
84902255811
-
-
accessed 4 May 2013
-
http://www.virtuous-ten-studio.com/, accessed 4 May 2013
-
-
-
-
24
-
-
84902250459
-
-
accessed 13 June 2013
-
http://source.android.com/, accessed 13 June 2013
-
-
-
-
26
-
-
84902289497
-
-
accessed 14 June 2013
-
http://developer.android.com/reference/android/Manifest.permission.html, accessed 14 June 2013
-
-
-
-
27
-
-
84902263062
-
-
accessed 13 June 2013
-
http://developer.android.com/guide/topics/manifest/permission-element. html, accessed 13 June 2013
-
-
-
-
28
-
-
84902254559
-
-
accessed 13 June 2013
-
http://developer.android.com/reference/android/provider/Settings.Secure. html#ANDROID-ID, accessed 13 June 2013
-
-
-
-
29
-
-
84867163696
-
A case study in open source software security and privacy: Android adware
-
E. Erturk, 'A case study in open source software security and privacy: Android adware', WorldCIS 2012, pp. 189-191.
-
WorldCIS 2012
, pp. 189-191
-
-
Erturk, E.1
-
30
-
-
84902256208
-
-
accessed 13 June 2013
-
R. Unuchek, 2013, "The most sophisticated Android Trojan", http://www.securelist.com/en/blog/8106/ThemostsophisticatedAndroidTrojan, accessed 13 June 2013
-
(2013)
The Most Sophisticated Android Trojan
-
-
Unuchek, R.1
-
31
-
-
84902271650
-
-
accessed 13 June 2013
-
http://code.google.com/p/dex2jar/, accessed 13 June 2013
-
-
-
-
32
-
-
84902246679
-
-
accessed 14 June 2013
-
http://developer.android.com/reference/android/telephony/ TelephonyManager.html#getDeviceId(), accessed 14 June 2013
-
-
-
|