-
1
-
-
84901602864
-
-
aug
-
Virus share, aug 2013. http://virusshare.com/.
-
(2013)
Virus Share
-
-
-
2
-
-
84901587713
-
-
Apr
-
IBM Rational AppScan, Apr. 2013. http://www-01.ibm.com/software/de/rational/appscan/.
-
(2013)
IBM Rational AppScan
-
-
-
3
-
-
84901625779
-
-
Apr
-
Fortify 360 Source Code Analyzer (SCA), Apr. 2013. http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#.UW6CVKuAtfQ.
-
(2013)
Fortify 360 Source Code Analyzer (SCA
-
-
-
4
-
-
84866946869
-
Automatically securing permission-based software by reducing the attack surface: An application to android
-
A. Bartel, J. Klein, Y. Le Traon, and M. Monperrus. Automatically securing permission-based software by reducing the attack surface: an application to android. In ASE 2012, pages 274-277, 2012.
-
(2012)
ASE 2012
, pp. 274-277
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
5
-
-
84863492870
-
Dexpler: Converting android dalvik bytecode to jimple for static analysis with soot
-
A. Bartel, J. Klein, Y. Le Traon, and M. Monperrus. Dexpler: converting android dalvik bytecode to jimple for static analysis with soot. In Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, SOAP '12, pages 27-38, 2012.
-
(2012)
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis, SOAP '12
, pp. 27-38
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
6
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications
-
L. Batyuk, M. Herpich, S. Camtepe, K. Raddatz, A.-D. Schmidt, and S. Albayrak. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications. In Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on, pages 66-72, 2011.
-
(2011)
Malicious and Unwanted Software (MALWARE) 2011 6th International Conference on
, pp. 66-72
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S.3
Raddatz, K.4
Schmidt, A.-D.5
Albayrak, S.6
-
8
-
-
79959861450
-
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders
-
ACM, May
-
E. Bodden, A. Sewe, J. Sinschek, H. Oueslati, and M. Mezini. Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders. In ICSE '11: International Conference on Software Engineering, pages 241-250. ACM, May 2011.
-
(2011)
ICSE ' 11: International Conference on Software Engineering
, pp. 241-250
-
-
Bodden, E.1
Sewe, A.2
Sinschek, J.3
Oueslati, H.4
Mezini, M.5
-
10
-
-
79251570920
-
Precise reasoning for programs using containers
-
I. Dillig, T. Dillig, and A. Aiken. Precise reasoning for programs using containers. In Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL '11, pages 187-200, 2011.
-
(2011)
Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '11
, pp. 187-200
-
-
Dillig, I.1
Dillig, T.2
Aiken, A.3
-
11
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association, R. H. Arpaci-Dusseau and B. Chen, editors
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In R. H. Arpaci-Dusseau and B. Chen, editors, OSDI, pages 393-407. USENIX Association, 2010.
-
(2010)
OSDI
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
12
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM, New York, NY, USA
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 3-14, New York, NY, USA, 2011. ACM. . URL http://doi.acm.org/10.1145/2046614.2046618.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
13
-
-
84889066310
-
Highly precise taint analysis for android applications
-
May
-
C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. Highly precise taint analysis for android applications. Technical Report TUD-CS-2013-0113, EC SPRIDE, May 2013. URL http://www.bodden.de/pubs/TUD-CS-2013-0113.pdf.
-
(2013)
Technical Report TUD-CS-2013-0113, EC SPRIDE
-
-
Fritz, C.1
Arzt, S.2
Rasthofer, S.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
15
-
-
84863084209
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. In Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, pages 291-307, 2012.
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST'12
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
16
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
ACM, New York, NY, USA
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pages 101-112, New York, NY, USA, 2012. ACM. . URL http://doi.acm.org/10.1145/2185448.2185464.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
17
-
-
84901633018
-
-
G. Inc. Application fundamentals. 2013. URL http://developer.android.com/guide/components/fundamentals.html.
-
(2013)
Application Fundamentals
-
-
Inc, G.1
-
18
-
-
84874425349
-
Efficient and effective handling of exceptions in java points-to analysis
-
R. Jhala and K. D. Bosschere, editors volume 7791 of Lecture Notes in Computer Science, Springer
-
G. Kastrinis and Y. Smaragdakis. Efficient and effective handling of exceptions in java points-to analysis. In R. Jhala and K. D. Bosschere, editors, CC, volume 7791 of Lecture Notes in Computer Science, pages 41-60. Springer, 2013.
-
(2013)
CC
, pp. 41-60
-
-
Kastrinis, G.1
Smaragdakis, Y.2
-
19
-
-
84920514359
-
ScanDal: Static analyzer for detecting privacy leaks in android applications
-
IEEE, H. Chen, L. Koved, and D. S. Wallach, editors Los Alamitos, CA, USA, May 2012
-
J. Kim, Y. Yoon, K. Yi, and J. Shin. ScanDal: Static analyzer for detecting privacy leaks in android applications. In H. Chen, L. Koved, and D. S. Wallach, editors, MoST 2012: Mobile Security Technologies 2012, Los Alamitos, CA, USA, May 2012. IEEE.
-
MoST 2012: Mobile Security Technologies 2012
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
-
20
-
-
58449135488
-
Implicit flows: Can't live with 'em, can't live without 'em
-
Berlin, Heidelberg, Springer-Verlag
-
D. King, B. Hicks, M. Hicks, and T. Jaeger. Implicit flows: Can't live with 'em, can't live without 'em. In Proceedings of the 4th International Conference on Information Systems Security, ICISS '08, pages 56-70, Berlin, Heidelberg, 2008. Springer-Verlag. .
-
(2008)
Proceedings of the 4th International Conference on Information Systems Security, ICISS ' 08
, pp. 56-70
-
-
King, D.1
Hicks, B.2
Hicks, M.3
Jaeger, T.4
-
22
-
-
35248842644
-
Scaling java points-to analysis using spark
-
G. Hedin, editor volume 2622 of LNCS, Springer Berlin Heidelberg
-
O. Lhoták and L. Hendren. Scaling java points-to analysis using spark. In G. Hedin, editor, Compiler Construction, volume 2622 of LNCS, pages 153-169. Springer Berlin Heidelberg, 2003. .
-
(2003)
Compiler Construction
, pp. 153-169
-
-
Lhoták, O.1
Hendren, L.2
-
23
-
-
84901633749
-
-
Mar
-
B. Livshits. Securibench micro, Mar. 2013. http://suif.stanford.edu/~livshits/work/securibench-micro/.
-
(2013)
Securibench Micro
-
-
Livshits, B.1
-
24
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: statically vetting android apps for component hijacking vulnerabilities. In CCS 2012, pages 229-240, 2012.
-
(2012)
CCS 2012
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
27
-
-
85075955161
-
Effective inter-component communication mapping in android: An essential step towards holistic security analysis
-
Aug
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In USENIX Security Symposium 2013, Aug. 2013.
-
(2013)
USENIX Security Symposium 2013
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Traon, Y.L.7
-
28
-
-
84901633750
-
-
Paladion. Insecurebank test app. http://www.paladion.net/downloadapp.html.
-
Insecurebank Test App
-
-
-
31
-
-
84924380709
-
A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors
-
April
-
A. Reina, A. Fattori, and L. Cavallaro. A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In EUROSEC, Prague, Czech Republic, April 2013.
-
(2013)
EUROSEC, Prague, Czech Republic
-
-
Reina, A.1
Fattori, A.2
Cavallaro, L.3
-
32
-
-
0029180939
-
Precise interprocedural dataflow analysis via graph reachability
-
T. Reps, S. Horwitz, and M. Sagiv. Precise interprocedural dataflow analysis via graph reachability. In POPL '95, pages 49-61, 1995.
-
(1995)
POPL ' 95
, pp. 49-61
-
-
Reps, T.1
Horwitz, S.2
Sagiv, M.3
-
33
-
-
47249122251
-
Ide dataflow analysis in the presence of large object-oriented libraries
-
volume 4959 of LNCS, Springer
-
A. Rountev, M. Sharp, and G. Xu. Ide dataflow analysis in the presence of large object-oriented libraries. In Compiler Construction, volume 4959 of LNCS, pages 53-68. Springer, 2008.
-
(2008)
Compiler Construction
, pp. 53-68
-
-
Rountev, A.1
Sharp, M.2
Xu, G.3
-
34
-
-
0030263395
-
Precise interprocedural dataflow analysis with applications to constant propagation
-
M. Sagiv, T. Reps, and S. Horwitz. Precise interprocedural dataflow analysis with applications to constant propagation. In TAPSOFT '95, pages 131-170, 1996.
-
(1996)
TAPSOFT ' 95
, pp. 131-170
-
-
Sagiv, M.1
Reps, T.2
Horwitz, S.3
-
36
-
-
81455159309
-
F4F: Taint analysis of framework-based web applications
-
M. Sridharan, S. Artzi, M. Pistoia, S. Guarnieri, O. Tripp, and R. Berg. F4F: taint analysis of framework-based web applications. In OOPSLA 2011, pages 1053-1068, 2011.
-
(2011)
OOPSLA 2011
, pp. 1053-1068
-
-
Sridharan, M.1
Artzi, S.2
Pistoia, M.3
Guarnieri, S.4
Tripp, O.5
Berg, R.6
-
37
-
-
84874382751
-
Andromeda: Accurate and scalable security analysis of web applications
-
O. Tripp, M. Pistoia, P. Cousot, R. Cousot, and S. Guarnieri. Andromeda: Accurate and scalable security analysis of web applications. In FASE 2013, pages 210-225, 2013.
-
(2013)
FASE 2013
, pp. 210-225
-
-
Tripp, O.1
Pistoia, M.2
Cousot, P.3
Cousot, R.4
Guarnieri, S.5
-
38
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
USENIX Association, Berkeley, CA, USA
-
R. Xu, H. Saïdi, and R. Anderson. Aurasium: practical policy enforcement for android applications. In USENIX Security 2012, Security'12, pages 27-27, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
USENIX Security 2012, Security'12
, pp. 27-27
-
-
Xu, R.1
Saïdi, H.2
Anderson, R.3
-
39
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
USENIX Association, Berkeley, CA, USA
-
L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In USENIX Security 2012, Security'12, pages 29-29, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
USENIX Security 2012, Security'12
, pp. 29-29
-
-
Yan, L.K.1
Yin, H.2
-
40
-
-
84873675066
-
Leakminer: Detect information leakage on android with static taint analysis
-
Z. Yang and M. Yang. Leakminer: Detect information leakage on android with static taint analysis. In Software Engineering (WCSE), 2012 Third World Congress on, pages 101-104, 2012.
-
(2012)
Software Engineering (WCSE 2012 Third World Congress on
, pp. 101-104
-
-
Yang, Z.1
Yang, M.2
-
41
-
-
84874579631
-
Trustdroid: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking
-
Z. Zhao and F. Osono. Trustdroid: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking. In Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on, pages 135-143, 2012.
-
(2012)
Malicious and Unwanted Software (MALWARE) 2012 7th International Conference on
, pp. 135-143
-
-
Zhao, Z.1
Osono, F.2
|