-
2
-
-
84904301635
-
-
Amazon Web Services May 2010
-
Amazon Web Services. IAM Best Practices, May 2010. http://docs.aws. amazon.com/IAM/latest/UserGuide/IAMBestPractices.html.
-
IAM Best Practices
-
-
-
3
-
-
84904302430
-
-
Amazon Web Services. Creating Temporary Security Credentials for Mobile Apps Using Identity Providers June 2011
-
Amazon Web Services. Creating Temporary Security Credentials for Mobile Apps Using Identity Providers. AWS Security Token Service, June 2011. http://docs. aws.amazon.com/STS/latest/UsingSTS/CreatingWIF.html.
-
AWS Security Token Service
-
-
-
4
-
-
84893615425
-
-
Amazon Web Services. Authenticating Users of AWS Mobile Applications with a Token Vending Machine July 2013
-
Amazon Web Services. Authenticating Users of AWS Mobile Applications with a Token Vending Machine. AWS Identity and Access Management, July 2013. http://aws.amazon.com/articles/4611615499399490.
-
AWS Identity and Access Management
-
-
-
5
-
-
84904337463
-
-
Amazon Web Services. Getting Started with the AWS SDK for Android Sept
-
Amazon Web Services. Getting Started with the AWS SDK for Android. AWS SDK for Android, Sept. 2013. http://docs.aws.amazon.com/mobile/sdkforandroid/ gsg/Welcome.html.
-
(2013)
AWS SDK for Android
-
-
-
6
-
-
84904322710
-
-
AndroLib. http://www.androlib.com.
-
AndroLib
-
-
-
7
-
-
84894562046
-
-
AppBrain. http://www.appbrain.com.
-
AppBrain
-
-
-
9
-
-
84904286944
-
-
Capistrano. http://capistranorb.com.
-
Capistrano
-
-
-
10
-
-
84904332548
-
-
Chef. http://www.getchef.com.
-
Chef
-
-
-
12
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
Apr
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. CloneCloud: Elastic Execution Between Mobile Device and Cloud. In Proceedings of the 6th European Conference on Computer systems (EuroSys 2011), Apr. 2011.
-
(2011)
Proceedings of the 6th European Conference on Computer Systems (EuroSys 2011)
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
17
-
-
84904338015
-
-
dex2jar. http://code.google.com/p/dex2jar.
-
Dex2jar
-
-
-
18
-
-
84874770365
-
What's app?: A Wide-Scale Measurement Study of Smart Phone Markets
-
Apr
-
N. d'Heureuse, F. Huici, M. Arumaithurai, M. Ahmed, K. Papagiannaki, and S. Niccolini. What's App?: A Wide-Scale Measurement Study of Smart Phone Markets. Mobile Computing and Communications Review, 16(2):16-27, Apr. 2012.
-
(2012)
Mobile Computing and Communications Review
, vol.16
, Issue.2
, pp. 16-27
-
-
D'Heureuse, N.1
Huici, F.2
Arumaithurai, M.3
Ahmed, M.4
Papagiannaki, K.5
Niccolini, S.6
-
19
-
-
84893066861
-
-
Elasticsearch. http://www.elasticsearch.org.
-
Elasticsearch
-
-
-
21
-
-
84904309144
-
-
Facebook. Login Security
-
Facebook. Login Security. https://developers.facebook. com/docs/facebook-login/security.
-
-
-
-
22
-
-
80755181021
-
A survey of mobile malware in the wild
-
July
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A Survey of Mobile Malware in the Wild. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011), July 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011)
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
23
-
-
84881131952
-
Adrob: Examining the landscape and impact of android application Plagiarism
-
June
-
C. Gibler, R. Stevens, J. Crussell, H. Chen, H. Zang, and H. Choi. AdRob: Examining the Landscape and Impact of Android Application Plagiarism. In Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013), June 2013.
-
(2013)
Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013)
-
-
Gibler, C.1
Stevens, R.2
Crussell, J.3
Chen, H.4
Zang, H.5
Choi, H.6
-
25
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware Detection
-
June
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys 2012), June 2012.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys 2012)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
27
-
-
84888999727
-
Juxtapp: A scalable system for detecting code reuse among Android Applications
-
July
-
S. Hanna, L. Huang, E. X. Wu, S. Li, C. Chen, and D. Song. Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications. In Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2012), July 2012.
-
(2012)
Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2012)
-
-
Hanna, S.1
Huang, L.2
Wu, E.X.3
Li, S.4
Chen, C.5
Song, D.6
-
29
-
-
84904309701
-
-
MixRank. http://www.mixrank.com.
-
MixRank
-
-
-
30
-
-
84955599420
-
My $500 cloud security screwup-UPDATED
-
R. Mogull. My $500 Cloud Security Screwup-UPDATED. Securosis Blog, Jan. 2014. https: //securosis.com/blog/my-500-cloud-security-screwup.
-
(2014)
Securosis Blog Jan
-
-
Mogull, R.1
-
32
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
May
-
C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach. Sci. Comput. Program., 74(7):470-495, May 2009.
-
(2009)
Sci. Comput. Program
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
40
-
-
84869848489
-
Refactoring android java code for on-demand computation Offoading
-
Oct
-
Y. Zhang, G. Huang, X. Liu, W. Zhang, H. Mei, and S. Yang. Refactoring Android Java Code for On-Demand Computation Offoading. In Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012), Oct. 2012.
-
(2012)
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012)
-
-
Zhang, Y.1
Huang, G.2
Liu, X.3
Zhang, W.4
Mei, H.5
Yang, S.6
-
41
-
-
84874828789
-
Fast scalable detection of "piggybacked" mobile applications
-
Feb
-
W. Zhou, Y. Zhou, M. C. Grace, X. Jiang, and S. Zou. Fast, Scalable Detection of "Piggybacked" Mobile Applications. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013), Feb. 2013.
-
(2013)
Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013)
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.C.3
Jiang, X.4
Zou, S.5
-
44
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in Official and alternative android markets
-
Feb
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012), Feb. 2012.
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|