메뉴 건너뛰기




Volumn , Issue , 2014, Pages 5070-5079

Enhancing user privacy on android mobile devices via permissions removal

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE DEVICES; REVERSE ENGINEERING; SYSTEMS SCIENCE;

EID: 84902243653     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2014.623     Document Type: Conference Paper
Times cited : (32)

References (32)
  • 2
    • 84902290896 scopus 로고    scopus 로고
    • accessed 14 April 2013
    • O. Hou, 2012, "A Look at Google Bouncer", http://blog. trendmicro.com/trendlabs-security-intelligence/a-look-at-google-bouncer/, accessed 14 April 2013
    • (2012) A Look at Google Bouncer
    • Hou, O.1
  • 4
    • 85037359376 scopus 로고    scopus 로고
    • Taming information-stealing smartphone applications (on android)
    • Y. Zhou, X. Zhang, X. Jiang & V. Freeh, "Taming information-stealing smartphone applications (on Android)", TRUST 2011, pp. 93-107.
    • TRUST 2011 , pp. 93-107
    • Zhou, Y.1    Zhang, X.2    Jiang, X.3    Freeh, V.4
  • 10
    • 84881416894 scopus 로고    scopus 로고
    • Permission tracking in android
    • M. Kern, & J. Sametinger, "Permission Tracking in Android", UBICOMM 2012, pp. 148-155.
    • UBICOMM 2012 , pp. 148-155
    • Kern, M.1    Sametinger, J.2
  • 12
    • 84860764042 scopus 로고    scopus 로고
    • MockDroid: Trading privacy for application functionality on smartphones
    • AR. Beresford, A. Rice, N. Skehin & R. Sohan, "MockDroid: trading privacy for application functionality on smartphones", HotMobile 2011, pp. 49-54.
    • HotMobile 2011 , pp. 49-54
    • Beresford, A.R.1    Rice, A.2    Skehin, N.3    Sohan, R.4
  • 13
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
    • P. Hornyack, S. Han, J. Jung, S. Schechter & D. Wetherall, "These aren't the droids you're looking for: retrofitting android to protect data from imperious applications", ACM CCS 2011, pp. 639-652.
    • ACM CCS 2011 , pp. 639-652
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 16
    • 84869458610 scopus 로고    scopus 로고
    • Repackaging android applications for auditing access to private data
    • P. Berthome, T. Fecherolle, N. Guilloteau & J.F. Lalande, "Repackaging Android Applications for Auditing Access to Private Data", ARES 2012, pp. 388-396.
    • ARES 2012 , pp. 388-396
    • Berthome, P.1    Fecherolle, T.2    Guilloteau, N.3    Lalande, J.F.4
  • 17
    • 84866433973 scopus 로고    scopus 로고
    • Android malware forensics: Reconstruction of malicious events
    • L. Juanru, G. Dawu & L. Yuhao, "Android Malware Forensics: Reconstruction of Malicious Events", ICDCSW 2012, pp. 552-558.
    • ICDCSW 2012 , pp. 552-558
    • Juanru, L.1    Dawu, G.2    Yuhao, L.3
  • 19
    • 84902287791 scopus 로고    scopus 로고
    • accessed 11 April 2013
    • http://apkmultitool.com/, accessed 11 April 2013
  • 20
    • 84902243515 scopus 로고    scopus 로고
    • accessed 11 April 2013
    • http://code.google.com/p/smali/, accessed 11 April 2013
  • 21
    • 84902254062 scopus 로고    scopus 로고
    • accessed 11 April 2013
    • http://java.decompiler.free.fr/?q=jdgui, accessed 11 April 2013
  • 22
    • 84863587187 scopus 로고    scopus 로고
    • A framework for static detection of privacy leaks in android applications
    • C. Mann & A Starostin, "A framework for static detection of privacy leaks in android applications", ACM SAC 2012, pp. 1457-1462.
    • ACM SAC 2012 , pp. 1457-1462
    • Mann, C.1    Starostin, A.2
  • 23
    • 84902255811 scopus 로고    scopus 로고
    • accessed 4 May 2013
    • http://www.virtuous-ten-studio.com/, accessed 4 May 2013
  • 24
    • 84902250459 scopus 로고    scopus 로고
    • accessed 13 June 2013
    • http://source.android.com/, accessed 13 June 2013
  • 26
    • 84902289497 scopus 로고    scopus 로고
    • accessed 14 June 2013
    • http://developer.android.com/reference/android/Manifest.permission.html, accessed 14 June 2013
  • 27
    • 84902263062 scopus 로고    scopus 로고
    • accessed 13 June 2013
    • http://developer.android.com/guide/topics/manifest/permission-element. html, accessed 13 June 2013
  • 28
    • 84902254559 scopus 로고    scopus 로고
    • accessed 13 June 2013
    • http://developer.android.com/reference/android/provider/Settings.Secure. html#ANDROID-ID, accessed 13 June 2013
  • 29
    • 84867163696 scopus 로고    scopus 로고
    • A case study in open source software security and privacy: Android adware
    • E. Erturk, 'A case study in open source software security and privacy: Android adware', WorldCIS 2012, pp. 189-191.
    • WorldCIS 2012 , pp. 189-191
    • Erturk, E.1
  • 30
  • 31
    • 84902271650 scopus 로고    scopus 로고
    • accessed 13 June 2013
    • http://code.google.com/p/dex2jar/, accessed 13 June 2013
  • 32
    • 84902246679 scopus 로고    scopus 로고
    • accessed 14 June 2013
    • http://developer.android.com/reference/android/telephony/ TelephonyManager.html#getDeviceId(), accessed 14 June 2013


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.