-
1
-
-
84906998624
-
-
"Android," http://www.android.com/.
-
-
-
-
2
-
-
84906998623
-
-
"Geinimi," http://www.symantec.com/security response/writeup.jsp? docid=2011-010111-5403-99.
-
-
-
-
3
-
-
84906998622
-
-
X. Jiang, "Droidkungfu," http://www.csc.ncsu.edu/faculty/jiang/ DroidKungFu.html.
-
-
-
Jiang, X.1
-
4
-
-
84906998621
-
-
X. Jiang, "Anserverbot," http://www.csc.ncsu.edu/faculty/jiang/ AnserverBot/.
-
-
-
Jiang, X.1
-
5
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM conference on Computer and communications security, 2011, pp. 627-638.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
6
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang, "Apex: extending android permission model and enforcement with user-defined runtime constraints," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010, pp. 328-332.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
7
-
-
84866899589
-
Analysis of android applications' permissions
-
R. Johnson, Z. Wang, C. Gagnon, and A. Stavrou, "Analysis of android applications' permissions," in Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability Companion, 2012, pp. 45-46.
-
(2012)
Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability Companion
, pp. 45-46
-
-
Johnson, R.1
Wang, Z.2
Gagnon, C.3
Stavrou, A.4
-
9
-
-
84871748420
-
-
"Google android market," https://play.google.com/store/apps? feature= corpus selector.
-
Google Android Market
-
-
-
10
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, "Android permissions: user attention, comprehension, and behavior," in Proceedings of the Eighth Symposium on Usable Privacy and Security, 2012, pp. 3:1-3:14.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security
, pp. 31-314
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
12
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets," in Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
18
-
-
84906998617
-
-
Android.dogowar
-
Symantec, "Android.dogowar," http://www.symantec.com/security response/writeup.jsp?docid=2011-081510-4323-99.
-
-
-
-
19
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification," in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 235-245.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
20
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in Proceedings of the 9th USENIX conference on Operating systems design and implementation, 2010, pp. 1-6.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
21
-
-
84906998616
-
D2taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources
-
B. Gu, X. Li, G. Li, A. C. Champion, Z. Chen, F. Qin, and D. Xuan, "D2taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources," Technical Report, Tech. Rep., 2012.
-
(2012)
Technical Report, Tech. Rep
-
-
Gu, B.1
Li, X.2
Li, G.3
Champion, A.C.4
Chen, Z.5
Qin, F.6
Xuan, D.7
-
22
-
-
80755143401
-
Crowdroid: Behaviorbased malware detection system for android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: behaviorbased malware detection system for android," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011, pp. 15-26.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
23
-
-
84856551625
-
Kernel-based behavior analysis for android malware detection
-
T. Isohara, K. Takemori, and A. Kubota, "Kernel-based behavior analysis for android malware detection," in Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security, 2011, pp. 1011-1015.
-
(2011)
Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security
, pp. 1011-1015
-
-
Isohara, T.1
Takemori, K.2
Kubota, A.3
|