-
1
-
-
79955570859
-
TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones
-
W. Enck et al., "TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones," in Proc. 9th USENIX Conf. OSDI, pp. 1-6, 2010.
-
(2010)
Proc. 9th USENIX Conf. OSDI
, pp. 1-6
-
-
Enck, W.1
-
3
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to Android
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to Android," in Proc. 17th ACM CCS, 2010, pp. 73-84.
-
Proc. 17th ACM CCS, 2010
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
4
-
-
84908080571
-
-
Available: accessed May 7, 2013
-
Mcafee Threats Report: Third Quarter 2012. [Online]. Available: http://www.mcafee.com/ca/resources/reports/rp-quarterly-threat-q3-2012.pdf, accessed May 7, 2013.
-
Mcafee Threats Report: Third Quarter 2012. [Online]
-
-
-
5
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov, "Learning and classification of malware behavior," in Proc. 5th Int. Conf. DIMVA, Jul. 2008, pp. 108-125.
-
Proc. 5th Int. Conf. DIMVA, Jul. 2008
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
6
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for Android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: Behavior-based malware detection system for Android," in Proc. 1st ACM Workshop SPSM, 2011, pp. 15-26.
-
Proc. 1st ACM Workshop SPSM, 2011
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
7
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," in Proc. 6th Int. Conf. MobiSys, 2008, pp. 225-238.
-
Proc. 6th Int. Conf. MobiSys, 2008
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
8
-
-
78650024495
-
Accessminer: Using system-centric models for malware protection
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, "Accessminer: Using system-centric models for malware protection," in Proc. 17th ACM Conf. CCS, 2010, pp. 399-412.
-
Proc. 17th ACM Conf. CCS, 2010
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
9
-
-
37849017546
-
Mining specifications of malicious behavior
-
Sep.
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proc. 6th Joint Meeting ESEC-FSE, pp. 5-14, Sep. 2007.
-
(2007)
Proc. 6th Joint Meeting ESEC-FSE
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
10
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan, "Synthesizing near-optimal malware specifications from suspicious behaviors," in Proc. IEEE Symp. SP, May 2010, pp. 45-60.
-
Proc. IEEE Symp. SP, May 2010
, pp. 45-60
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
11
-
-
77955199408
-
Identifying dormant functionality in malware programs
-
P. M. Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Kruegel, and S. Zanero, "Identifying dormant functionality in malware programs," in Proc. IEEE Symp. SP, May 2010, pp. 61-76.
-
Proc. IEEE Symp. SP, May 2010
, pp. 61-76
-
-
Comparetti, P.M.1
Salvaneschi, G.2
Kirda, E.3
Kolbitsch, C.4
Kruegel, C.5
Zanero, S.6
-
12
-
-
84865279802
-
A quantitative study of accuracy in system call-based malware detection
-
D. Canali, A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, "A quantitative study of accuracy in system call-based malware detection," in Proc. ISSTA, 2012, pp. 122-132.
-
Proc. ISSTA, 2012
, pp. 122-132
-
-
Canali, D.1
Lanzi, A.2
Balzarotti, D.3
Kruegel, C.4
Christodorescu, M.5
Kirda, E.6
-
13
-
-
84889034388
-
-
DAI-Labor, Berlin, Germany, Tech. Rep.
-
H.-G. Schmidt, K. Raddatz, A.-D. Schmidt, A. Camtepe, and S. Albayrak, "Google Android: A comprehensive introduction," DAI-Labor, Berlin, Germany, Tech. Rep. TUB-DAI 03/09-01, 2009.
-
(2009)
Google Android: A Comprehensive Introduction
-
-
Schmidt, H.-G.1
Raddatz, K.2
Schmidt, A.-D.3
Camtepe, A.4
Albayrak, S.5
-
14
-
-
84860630143
-
Shadow attacks: Automatically evading system-call-behavior based malware detection
-
May
-
W. Ma, P. Duan, S. Liu, G. Gu, and J.-C. Liu, "Shadow attacks: Automatically evading system-call-behavior based malware detection," J. Comput. Virol., vol. 8, nos. 1-2, pp. 1-13, May 2012.
-
(2012)
J. Comput. Virol.
, vol.8
, Issue.1-2
, pp. 1-13
-
-
Ma, W.1
Duan, P.2
Liu, S.3
Gu, G.4
Liu, J.-C.5
-
15
-
-
60049085302
-
Understanding Android security
-
Jan./Feb.
-
W. Enck, M. Ongtang, and P. McDaniel, "Understanding Android security," IEEE Security Privacy, vol. 7, no. 1, pp. 50-57, Jan./Feb. 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
16
-
-
80755172898
-
The effectiveness of application permissions
-
A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in Proc. 2nd USENIX Conf. WebApps, 2011, p. 7.
-
Proc. 2nd USENIX Conf. WebApps, 2011
, pp. 7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
17
-
-
84908074644
-
-
Available
-
(2011). Apple: iOS 4. [Online]. Available: http://www.apple.com/iphone
-
(2011)
Apple: IOS 4. [Online]
-
-
-
18
-
-
84908076832
-
-
Available: accessed May 7, 2013
-
Android Permissions. [Online]. Available: http://developer.android.com/reference/android/Manifest.permission.html, accessed May 7, 2013.
-
Android Permissions. [Online]
-
-
-
19
-
-
84889068951
-
Vetting undesirable behaviors in Android apps with permission use analysis
-
Y. Zhang et al., "Vetting undesirable behaviors in Android apps with permission use analysis," in Proc. ACM SIGSAC Conf. CCS, 2013, pp. 611-622.
-
Proc. ACM SIGSAC Conf. CCS, 2013
, pp. 611-622
-
-
Zhang, Y.1
-
20
-
-
84889041424
-
AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang, "AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection," in Proc. ACM SIGSAC Conf. CCS, 2013, pp. 1043-1054.
-
Proc. ACM SIGSAC Conf. CCS, 2013
, pp. 1043-1054
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
21
-
-
84866608644
-
Profiledroid: Multi-layer profiling of Android applications
-
X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, "Profiledroid: Multi-layer profiling of Android applications," in Proc. 18th Annu. Int. Conf. Mobicom, 2012, pp. 137-148.
-
Proc. 18th Annu. Int. Conf. Mobicom, 2012
, pp. 137-148
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
22
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis
-
L. K. Yan and H. Yin, "Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis," in Proc. USENIX Security Symp., 2012, pp. 569-584.
-
Proc. USENIX Security Symp., 2012
, pp. 569-584
-
-
Yan, L.K.1
Yin, H.2
-
23
-
-
84910620092
-
Contextual policy enforcement in Android applications with permission event graphs
-
K. Z. Chen et al., "Contextual policy enforcement in Android applications with permission event graphs," in Proc. NDSS, Feb. 2013.
-
Proc. NDSS, Feb. 2013
-
-
Chen, K.Z.1
-
24
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proc. 18th ACM Conf. CCS, 2011, pp. 627-638.
-
Proc. 18th ACM Conf. CCS, 2011
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
25
-
-
84869388345
-
PScout: Analyzing the Android permission specification
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, "PScout: Analyzing the Android permission specification," in Proc. ACM Conf. CCS, 2012, pp. 217-228.
-
Proc. ACM Conf. CCS, 2012
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
26
-
-
84908076825
-
-
Available: accessed May 7, 2013
-
Pendingintent. [Online]. Available: http://developer.android.com/reference/android/app/PendingIntent.html, accessed May 7, 2013.
-
Pendingintent. [Online]
-
-
-
27
-
-
84870819587
-
-
Available: accessed May 7, 2013
-
Ui/Application Exerciser Monkey. [Online]. Available: http://developer.android.com/tools/help/monkey.html, accessed May 7, 2013.
-
Ui/Application Exerciser Monkey. [Online]
-
-
-
28
-
-
84930525327
-
A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors
-
A. Reina, A. Fattori, and L. Cavallaro, "A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors," in Proc. EuroSec, Apr. 2013.
-
Proc. EuroSec, Apr. 2013
-
-
Reina, A.1
Fattori, A.2
Cavallaro, L.3
-
29
-
-
84878368035
-
Dissecting Android malware: Characterization and evolution
-
Y. Zhou and X. Jiang, "Dissecting Android malware: Characterization and evolution," in Proc. IEEE Symp. SP, May 2012, pp. 95-109.
-
Proc. IEEE Symp. SP, May 2012
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
31
-
-
84893082487
-
Defeating mTANs for profit - Part one
-
Apr.
-
A. Apvrille and K. Yang, "Defeating mTANs for profit - Part one," Virus Bull. Mag., vol. 7, no. 4, pp. 4-10, Apr. 2011.
-
(2011)
Virus Bull. Mag.
, vol.7
, Issue.4
, pp. 4-10
-
-
Apvrille, A.1
Yang, K.2
-
34
-
-
84908076821
-
-
Available: accessed May 7, 2013
-
Android.SMSReplicator. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2010-110214%-1252-99, accessed May 7, 2013.
-
Android.SMSReplicator. [Online]
-
-
-
36
-
-
84908067636
-
-
Available: accessed May 7, 2013
-
ZeuS-in-the-Mobile - Facts and Theories. [Online]. Available: http://www.securelist.com/en/analysis/204792194/ZeuS-in-the-Mobile-Fact-and-Theories, accessed May 7, 2013.
-
ZeuS-in-the-Mobile - Facts and Theories. [Online]
-
-
-
37
-
-
84866721423
-
DTA++: Dynamic taint analysis with targeted control-flow propagation
-
M. G. Kang, S. McCamant, P. Poosankam, and D. Song, "DTA++: Dynamic taint analysis with targeted control-flow propagation," in Proc. NDSS, Feb. 2011.
-
Proc. NDSS, Feb. 2011
-
-
Kang, M.G.1
McCamant, S.2
Poosankam, P.3
Song, D.4
-
38
-
-
49949117136
-
On the limits of information flow techniques for malware analysis and containment
-
L. Cavallaro, P. Saxena, and R. Sekar, "On the limits of information flow techniques for malware analysis and containment," in Proc. 5th Int. Conf. DIMVA, Jul. 2008, pp. 143-163.
-
Proc. 5th Int. Conf. DIMVA, Jul. 2008
, pp. 143-163
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
39
-
-
84887633886
-
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
-
G. Sarwar, O. Mehani, R. Boreli, and D. Kaafar, "On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices," in Proc. 10th Int. Conf. SECRYPT, 2013, pp. 461-467.
-
Proc. 10th Int. Conf. SECRYPT, 2013
, pp. 461-467
-
-
Sarwar, G.1
Mehani, O.2
Boreli, R.3
Kaafar, D.4
-
40
-
-
85165758676
-
Systematic detection of capability leaks in stock Android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang, "Systematic detection of capability leaks in stock Android smartphones," in Proc. NDSS, 2012.
-
Proc. NDSS, 2012
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
41
-
-
84874865861
-
AppsPlayground: Automatic security analysis of smartphone applications
-
V. Rastogi, Y. Chen, and W. Enck, "AppsPlayground: Automatic security analysis of smartphone applications," in Proc. 3rd ACM Conf. CODASPY, 2013, pp. 209-220.
-
Proc. 3rd ACM Conf. CODASPY, 2013
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
42
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung, "Vision: Automated security validation of mobile apps at app markets," in Proc. 2nd Int. Workshop MCS, 2011, pp. 21-26.
-
Proc. 2nd Int. Workshop MCS, 2011
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
43
-
-
84881287915
-
-
Program Anal. Group, Georgia Inst. Technol., Atlanta, GA, USA, Tech. Rep.
-
A. MacHiry, R. Tahiliani, and M. Naik, "Dynodroid: An input generation system for Android apps," Program Anal. Group, Georgia Inst. Technol., Atlanta, GA, USA, Tech. Rep. GIT-CERCS-12-09, 2012.
-
(2012)
Dynodroid: An Input Generation System for Android Apps
-
-
MacHiry, A.1
Tahiliani, R.2
Naik, M.3
-
44
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
A. Moser, C. Kruegel, and E. Kirda, "Exploring multiple execution paths for malware analysis," in Proc. IEEE Symp. SP, May 2007, pp. 231-245.
-
Proc. IEEE Symp. SP, May 2007
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
45
-
-
38149096122
-
A forced sampled execution approach to kernel rootkit identification
-
J. Wilhelm and T.-C. Chiueh, "A forced sampled execution approach to kernel rootkit identification," in Proc. 10th Int. Conf. RAID, 2007, pp. 219-235.
-
Proc. 10th Int. Conf. RAID, 2007
, pp. 219-235
-
-
Wilhelm, J.1
Chiueh, T.-C.2
-
46
-
-
84869435137
-
PeerPress: Utilizing enemies' P2P strength against them
-
Z. Xu, L. Chen, G. Gu, and C. Kruegel, "PeerPress: Utilizing enemies' P2P strength against them," in Proc. ACM Conf. CCS, 2012, pp. 581-592.
-
Proc. ACM Conf. CCS, 2012
, pp. 581-592
-
-
Xu, Z.1
Chen, L.2
Gu, G.3
Kruegel, C.4
-
47
-
-
84879543890
-
MAST: Triage for market-scale mobile malware analysis
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck, "MAST: Triage for market-scale mobile malware analysis," in Proc. 6th ACM Conf. WiSec, 2013, pp. 13-24.
-
Proc. 6th ACM Conf. WiSec, 2013
, pp. 13-24
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
48
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proc. 1st ACM Workshop SPSM, 2011, pp. 3-14.
-
Proc. 1st ACM Workshop SPSM, 2011
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
49
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets," in Proc. NDSS, 2012.
-
Proc. NDSS, 2012
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
50
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day Android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "RiskRanker: Scalable and accurate zero-day Android malware detection," in Proc. 10th Int. Conf. MobiSys, 2012, pp. 281-294.
-
Proc. 10th Int. Conf. MobiSys, 2012
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
51
-
-
85044855162
-
How to ask for permission
-
A. P. Felt, S. Egelman, M. Finifter, D. Akhawe, and D. Wagner, "How to ask for permission," in Proc. HotSec, 2012.
-
Proc. HotSec, 2012
-
-
Felt, A.P.1
Egelman, S.2
Finifter, M.3
Akhawe, D.4
Wagner, D.5
-
52
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification," in Proc. 16th ACM Conf. CCS, 2009, pp. 235-245.
-
Proc. 16th ACM Conf. CCS, 2009
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
53
-
-
77954487766
-
Apex: Extending Android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang, "Apex: Extending Android permission model and enforcement with user-defined runtime constraints," in Proc. 5th ASIACCS, 2010, pp. 328-332.
-
Proc. 5th ASIACCS, 2010
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
54
-
-
77950851532
-
Semantically rich application-centric security in Android
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, "Semantically rich application-centric security in Android," in Proc. ACSAC, Dec. 2009, pp. 340-349.
-
Proc. ACSAC, Dec. 2009
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
55
-
-
84888310280
-
Practical context-aware permission control for hybrid mobile applications
-
K. Singh, "Practical context-aware permission control for hybrid mobile applications," in Proc. 16th Int. Symp. RAID, Oct. 2013, pp. 307-327.
-
Proc. 16th Int. Symp. RAID, Oct. 2013
, pp. 307-327
-
-
Singh, K.1
-
56
-
-
84874835750
-
AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users
-
S. Rosen, Z. Qian, and Z. M. Mao, "AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users," in Proc. 3rd ACM CODASPY, 2013, pp. 221-232.
-
Proc. 3rd ACM CODASPY, 2013
, pp. 221-232
-
-
Rosen, S.1
Qian, Z.2
Mao, Z.M.3
-
57
-
-
85019170256
-
WHYPER: Towards automating risk assessment of mobile applications
-
Aug.
-
R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, "WHYPER: Towards automating risk assessment of mobile applications," in Proc. USENIX Security Symp., pp. 527-542, Aug. 2013.
-
(2013)
Proc. USENIX Security Symp.
, pp. 527-542
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
58
-
-
84874080269
-
Mining permission request patterns from Android and Facebook applications
-
M. Frank, B. Dong, A. P. Felt, and D. Song, "Mining permission request patterns from Android and Facebook applications," in Proc. IEEE 12th ICDM, Dec. 2012, pp. 870-875.
-
Proc. IEEE 12th ICDM, Dec. 2012
, pp. 870-875
-
-
Frank, M.1
Dong, B.2
Felt, A.P.3
Song, D.4
-
59
-
-
84869432690
-
Using probabilistic generative models for ranking risks of Android apps
-
H. Peng et al., "Using probabilistic generative models for ranking risks of Android apps," in Proc. ACM CCS, 2012, pp. 241-252.
-
Proc. ACM CCS, 2012
, pp. 241-252
-
-
Peng, H.1
-
60
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J.Wang, A. Moshchuk, S. Hanna, and E. Chin, "Permission re-delegation: Attacks and defenses," in Proc. USENIX Security Symp., 2011.
-
Proc. USENIX Security Symp., 2011
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
61
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach, "Quire: Lightweight provenance for smart phone operating systems," in Proc. USENIX Security Symp., 2011.
-
Proc. USENIX Security Symp., 2011
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
62
-
-
84869416020
-
CHEX: Statically vetting Android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, "CHEX: Statically vetting Android apps for component hijacking vulnerabilities," in Proc. ACM Conf. CCS, 2012, pp. 229-240.
-
Proc. ACM Conf. CCS, 2012
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
63
-
-
84860696959
-
DroidChecker: Analyzing Android applications for capability leak
-
P. P. F. Chan, L. C. K. Hui, and S. M. Yiu, "DroidChecker: Analyzing Android applications for capability leak," in Proc. 5th ACM Conf. WISEC, 2012, pp. 125-136.
-
Proc. 5th ACM Conf. WISEC, 2012
, pp. 125-136
-
-
Chan, P.P.F.1
Hui, L.C.K.2
Yiu, S.M.3
-
64
-
-
84875264064
-
Towards taming privilege-escalation attacks on Android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry, "Towards taming privilege-escalation attacks on Android," in Proc. NDSS, Feb. 2012.
-
Proc. NDSS, Feb. 2012
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
|