-
1
-
-
84908643122
-
-
Amazon ec2. http://aws.amazon.com/ec2/.
-
-
-
Amazon ec21
-
2
-
-
84908643121
-
-
Avg threat labs. http://www.avgthreatlabs.com/android-app-reports app/-pkg=com.bluecode.photo.space.effects.apk.
-
-
-
Avg threat labs1
-
3
-
-
84866382195
-
Analysis of malicious and benign android applications
-
Washington, DC, USA, IEEE Computer Society
-
Moutaz Alazab, Veelasha Monsamy, Lynn Batten, Patrik Lantz, and Ronghua Tian. Analysis of malicious and benign android applications. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, ICDCSW'12, pages 608-616, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, ICDCSW'12
, pp. 608-616
-
-
Alazab, M.1
Monsamy, V.2
Batten, L.3
Lantz, P.4
Tian, R.5
-
4
-
-
84908632431
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android appstion in tcb source code
-
Edinburgh, UK
-
Steven Arzt, Siedfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android appstion in tcb source code. In PLDI'14, Edinburgh, UK, 2014.
-
(2014)
PLDI'14
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
5
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. Pscout: analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS'12, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
6
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
New York, NY, USA, ACM
-
David Barrera, H. Günęs Kayacik, Paul C. Van Oorschot, and Anil Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, pages 73-84, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10
, pp. 73-84
-
-
Barrera, D.1
Günęs Kayacik, H.2
Van Oorschot, P.C.3
Somayaji, A.4
-
7
-
-
84863492870
-
Dexpler: Converting android dalvik bytecode to jimple for static analysis with soot
-
New York, NY, USA, ACM
-
Alexandre Bartel, Jacques Klein, Yves Le Traon, and Martin Monperrus. Dexpler: converting android dalvik bytecode to jimple for static analysis with soot. In Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, SOAP'12, pages 27-38, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis, SOAP'12
, pp. 27-38
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
8
-
-
84860764042
-
Mockdroid: Trading privacy for application functionality on smartphones
-
New York, NY, USA, ACM
-
Alastair R. Beresford, Andrew Rice, Nicholas Skehin, and Ripduman Sohan. Mockdroid: trading privacy for application functionality on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile'11, pages 49-54, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile'11
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
9
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
New York, NY, USA, ACM
-
Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM'11, pages 15-26, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM'11
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
10
-
-
84860696959
-
Droidchecker: Analyzing android applications for capability leak
-
New York, NY, USA, ACM
-
Patrick P. F. Chan, Lucas C. K. Hui, and S. M. Yiu. Droidchecker: analyzing android applications for capability leak. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC'12, pages 125-136, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'12
, pp. 125-136
-
-
Chan, P.P.F.1
Hui, L.C.K.2
Yiu, S.M.3
-
13
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA, USENIX Association
-
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
15
-
-
80755187788
-
Android permissions demystified
-
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS'11, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
16
-
-
80755172898
-
The effectiveness of application permissions
-
Berkeley, CA, USA, USENIX Association
-
Adrienne Porter Felt, Kate Greenwood, and David Wagner. The effectiveness of application permissions. In Proceedings of the 2Nd USENIX Conference on Web Application Development, WebApps'11, pages 7-7, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 2Nd USENIX Conference on Web Application Development, WebApps'11
, pp. 7-7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
17
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. Android Permissions: User Attention, Comprehension, and Behavior. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS), 2012.
-
(2012)
Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS)
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
18
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steven Hanna, and Erika Chin. Permission re-delegation: attacks and defenses. In Proceedings of the 20th USENIX conference on Security, SEC'11, 2011.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
19
-
-
84865576227
-
Modeling and enhancing androids permission system
-
Sara Foresti, Moti Yung, and Fabio Martinelli, editors, Springer Berlin Heidelberg
-
Elli Fragkaki, Lujo Bauer, Limin Jia, and David Swasey. Modeling and enhancing androids permission system. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, Computer Security ESORICS 2012, volume 7459 of Lecture Notes in Computer Science, pages 1-18. Springer Berlin Heidelberg, 2012.
-
(2012)
Computer Security ESORICS 2012, Volume 7459 of Lecture Notes in Computer Science
, pp. 1-18
-
-
Fragkaki, E.1
Bauer, L.2
Jia, L.3
Swasey, D.4
-
21
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
New York, NY, USA, ACM
-
Michael C. Grace, Wu Zhou, Xuxian Jiang, and Ahmad-Reza Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC'12, pages 101-112, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'12
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.4
-
22
-
-
84893539369
-
Flow permissions for android
-
Shashank Holavanalli, Don Manuel, Vishwas Nanjundaswamy, Brian Rosenberg, Feng Shen, Steven Y. Ko, and Lukasz Ziarek. Flow permissions for android. In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013), 2013.
-
(2013)
Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013)
-
-
Holavanalli, S.1
Manuel, D.2
Nanjundaswamy, V.3
Rosenberg, B.4
Shen, F.5
Ko, S.Y.6
Ziarek, L.7
-
23
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and communications security (CCS), 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
24
-
-
84893601570
-
ScanDal: Static analyzer for detecting privacy leaks in android applications
-
Hao Chen, Larry Koved, and Dan S. Wallach, editors, Los Alamitos, CA, USA, May, IEEE
-
Jinyung Kim, Yongho Yoon, Kwangkeun Yi, and Junbum Shin. ScanDal: Static analyzer for detecting privacy leaks in android applications. In Hao Chen, Larry Koved, and Dan S. Wallach, editors, MoST 2012: Mobile Security Technologies 2012, Los Alamitos, CA, USA, May 2012. IEEE.
-
(2012)
MoST 2012: Mobile Security Technologies 2012
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
-
25
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, and Guofei Jiang. Chex: statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS'12, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS'12
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
26
-
-
84863587187
-
A framework for static detection of privacy leaks in android applications
-
New York, NY, USA, ACM
-
Christopher Mann and Artem Starostin. A framework for static detection of privacy leaks in android applications. In Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC'12, pages 1457-1462, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC'12
, pp. 1457-1462
-
-
Mann, C.1
Starostin, A.2
-
27
-
-
84875648983
-
Towards an understanding of the impact of advertising on data leaks
-
March
-
Veelasha Moonsamy, Moutaz Alazab, and Lynn Batten. Towards an understanding of the impact of advertising on data leaks. Int. J. Secur. Netw., 7(3):181-193, March 2012.
-
(2012)
Int. J. Secur. Netw.
, vol.7
, Issue.3
, pp. 181-193
-
-
Moonsamy, V.1
Alazab, M.2
Batten, L.3
-
29
-
-
85075955161
-
Effective inter-component communication mapping in android: An essential step towards holistic security analysis
-
Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security'13), 2013.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium (USENIX Security'13)
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Le Traon, Y.7
-
30
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
New York, NY, USA, ACM
-
Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, and David Wagner. Addroid: privilege separation for applications and advertisers in android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS'12, pages 71-72, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS'12
, pp. 71-72
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
31
-
-
84874835750
-
Appprofiler: A flexible method of exposing privacy-related behavior in android applications to end users
-
New York, NY, USA, ACM
-
Sanae Rosen, Zhiyun Qian, and Z. Morely Mao. Appprofiler: A flexible method of exposing privacy-related behavior in android applications to end users. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, pages 221-232, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY'13
, pp. 221-232
-
-
Rosen, S.1
Qian, Z.2
Morely Mao, Z.3
-
32
-
-
84888348488
-
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
-
Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, and Jorge Blasco. Dendroid: A text mining approach to analyzing and classifying code structures in android malware families. Expert Systems with Applications, 41(4, Part 1):1104-1117, 2014.
-
(2014)
Expert Systems with Applications
, vol.41
, Issue.4
, pp. 1104-1117
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris-Lopez, P.3
Blasco, J.4
-
33
-
-
0001956132
-
Soot - A java bytecode optimization framework
-
IBM Press
-
Raja Vallée-Rai, Phong Co, Etienne Gagnon, Laurie Hendren, Patrick Lam, and Vijay Sundaresan. Soot - a java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON'99, pages 13-. IBM Press, 1999.
-
(1999)
Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON'99
, pp. 13
-
-
Vallée-Rai, R.1
Co, P.2
Gagnon, E.3
Hendren, L.4
Lam, P.5
Sundaresan, V.6
-
34
-
-
84956985758
-
Optimizing java bytecode using the soot framework: Is it feasible?
-
London, UK, UK, Springer-Verlag
-
Raja Vallée-Rai, Etienne Gagnon, Laurie J. Hendren, Patrick Lam, Patrice Pominville, and Vijay Sundaresan. Optimizing java bytecode using the soot framework: Is it feasible? In Proceedings of the 9th International Conference on Compiler Construction, CC'00, pages 18-34, London, UK, UK, 2000. Springer-Verlag.
-
(2000)
Proceedings of the 9th International Conference on Compiler Construction, CC'00
, pp. 18-34
-
-
Vallée-Rai, R.1
Gagnon, E.2
Hendren, L.J.3
Lam, P.4
Pominville, P.5
Sundaresan, V.6
-
35
-
-
57449101131
-
Securing java code: Heuristics and an evaluation of static analysis tools
-
New York, NY, USA, ACM
-
Michael S. Ware and Christopher J. Fox. Securing java code: heuristics and an evaluation of static analysis tools. In Proceedings of the 2008 workshop on Static analysis, SAW'08, pages 12-21, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 Workshop on Static Analysis, SAW'08
, pp. 12-21
-
-
Ware, M.S.1
Fox, C.J.2
-
36
-
-
84866936202
-
User-aware privacy control via extended static-information-flow analysis
-
New York, NY, USA, ACM
-
Xusheng Xiao, Nikolai Tillmann, Manuel Fahndrich, Jonathan De Halleux, and Michal Moskal. User-aware privacy control via extended static-information-flow analysis. In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pages 80-89, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012
, pp. 80-89
-
-
Xiao, X.1
Tillmann, N.2
Fahndrich, M.3
De Halleux, J.4
Moskal, M.5
-
38
-
-
84889041424
-
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
-
New York, NY, USA, ACM
-
Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, and X. Sean Wang. Appintent: Analyzing sensitive data transmission in android for privacy leakage detection. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS'13, pages 1043-1054, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS'13
, pp. 1043-1054
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Sean Wang, X.6
-
39
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
New York, NY, USA, ACM
-
Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean Wang, and Binyu Zang. Vetting undesirable behaviors in android apps with permission use analysis. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS'13, pages 611-622, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS'13
, pp. 611-622
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
Gu, G.5
Ning, P.6
Wang, X.K.7
Zang, B.8
|