-
3
-
-
84937849112
-
-
Apple, Inc. The ios environment. https://developer.apple.com/library/ios/documentation/iphone/conceptual/iphoneosprogrammingguide/TheiOSEnvironment/TheiOSEnvironment.html,.
-
The Ios Environment
-
-
Apple Inc1
-
6
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In 19th Annual Network & Distributed System Security Symposium (NDSS), volume 17, pages 18-25, 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium (NDSS
, vol.17
, pp. 18-25
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
7
-
-
79961035117
-
Analyzing inter-application communication in android
-
ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, pages 239-252. ACM, 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
9
-
-
85037073388
-
Privilege escalation attacks on android
-
Springer
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy. Privilege escalation attacks on android. In Information Security, pages 346-360. Springer, 2011.
-
(2011)
Information Security
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
12
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-Daniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, volume 10, pages 1-6, 2010.
-
(2010)
OSDI
, vol.10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mc-Daniel, P.6
Sheth, A.7
-
13
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
17
-
-
84863297774
-
Accomplice: Location inference using accelerometers on smartphones
-
Jan
-
J. Han, E. Owusu, L. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on, pages 1-9, Jan 2012.
-
(2012)
Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on
, pp. 1-9
-
-
Han, J.1
Owusu, E.2
Nguyen, L.3
Perrig, A.4
Zhang, J.5
-
19
-
-
84898968161
-
Mactans: Injecting malware into iOS devices via malicious chargers
-
B. Lau, Y. Jang, C. Song, T. Wang, P. H. Chung, and P. Royal. Mactans: Injecting malware into iOS devices via malicious chargers. In Proceedings of Black Hat USA, 2013.
-
(2013)
Proceedings of Black Hat USA
-
-
Lau, B.1
Jang, Y.2
Song, C.3
Wang, T.4
Chung, P.H.5
Royal, P.6
-
20
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
ACM
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 229-240. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
21
-
-
2942710197
-
Recent development: Leveling the accessibility playing field: Section 508 of the rehabilitation act
-
C. McLawhorn. Recent development: Leveling the accessibility playing field: Section 508 of the rehabilitation act. NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY, 3(1):63-100, 2001.
-
(2001)
NORTH Carolina Journal of Law & Technology
, vol.3
, Issue.1
, pp. 63-100
-
-
McLawhorn, C.1
-
26
-
-
80052803379
-
Do windows users follow the principle of least privilege?: Investigating user account control practices
-
New York, NY, USA, ACM
-
S. Motiee, K. Hawkey, and K. Beznosov. Do windows users follow the principle of least privilege?: investigating user account control practices. In Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10
-
-
Motiee, S.1
Hawkey, K.2
Beznosov, K.3
-
30
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J.Wang, and C. Cowan. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In Proceedings of the IEEE Symposium on Security and Privacy, 2012.
-
(2012)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
31
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In NDSS, 2011.
-
(2011)
NDSS
-
-
Schlegel, R.1
Zhang, K.2
Yong Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
33
-
-
84906743353
-
Jekyll on ios: When benign apps become evil
-
T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on ios: When benign apps become evil. In The 22nd USENIX Security Symposium (SECURITY), 2013.
-
(2013)
The 22nd USENIX Security Symposium (SECURITY
-
-
Wang, T.1
Lu, K.2
Lu, L.3
Chung, S.4
Lee, W.5
-
34
-
-
84889012971
-
The impact of vendor customizations on Android security
-
L. Wu, M. Grace, Y. Zhou, C. Wu, and X. Jiang. The impact of vendor customizations on Android security. In ACM conference on Computer and communications security (CCS '13), 2013.
-
(2013)
ACM Conference on Computer and Communications Security (CCS '13
-
-
Wu, L.1
Grace, M.2
Zhou, Y.3
Wu, C.4
Jiang, X.5
-
35
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3g smartphones
-
New York, NY, USA, ACM
-
N. Xu, F. Zhang, Y. Luo,W. Jia, D. Xuan, and J. Teng. Stealthy video capturer: A new video-based spyware in 3g smartphones. In Proceedings of the Second ACM Conference on Wireless Network Security, WiSec '09, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security, WiSec '09
-
-
Xu, N.1
Zhang, F.2
Luow. Jia, Y.3
Xuan, D.4
Teng, J.5
|