메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1329-1341

Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps

Author keywords

Android application; ICC (inter component communication); Information leakage; Malware; Points to analysis; Security vetting; Vulnerable app

Indexed keywords

ANDROID (OPERATING SYSTEM); C (PROGRAMMING LANGUAGE); DATA FLOW ANALYSIS; MALWARE; STATIC ANALYSIS; DATA TRANSFER;

EID: 84910617173     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660357     Document Type: Conference Paper
Times cited : (438)

References (37)
  • 3
    • 84910664881 scopus 로고    scopus 로고
    • Google Bouncer. http://googlemobile.blogspot.com /2012/02/android-and-security.html.
    • Google Bouncer
  • 13
    • 84876196428 scopus 로고    scopus 로고
    • ENISA. Smartphone secure development guidelines. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/smartphone-security-1/smartphone-secure-development-guidelines, 2011.
    • (2011) Smartphone Secure Development Guidelines
    • ENISA1
  • 19
    • 85165758676 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock Android smartphones
    • M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock Android smartphones. In Proceedings of the NDSS, 2012.
    • (2012) Proceedings of the NDSS
    • Grace, M.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 23
    • 84869416020 scopus 로고    scopus 로고
    • CHEX: Statically vetting Android apps for component hijacking vulnerabilities
    • L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. CHEX: Statically vetting Android apps for component hijacking vulnerabilities. In Proceedings of the ACM CCS, 2012.
    • (2012) Proceedings of the ACM CCS
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.5
  • 29
    • 0030263395 scopus 로고    scopus 로고
    • Precise interprocedural dataow analysis with applications to constant propagation
    • M. Sagiv, T. Reps, and S. Horwitz. Precise interprocedural dataow analysis with applications to constant propagation. Theoretical Computer Science, 167(1):131-170, 1996.
    • (1996) Theoretical Computer Science , vol.167 , Issue.1 , pp. 131-170
    • Sagiv, M.1    Reps, T.2    Horwitz, S.3
  • 30
    • 85091276968 scopus 로고    scopus 로고
    • Security enhanced (se) android: Bringing exible mac to android
    • S. Smalley and R. Craig. Security enhanced (SE) Android: Bringing exible MAC to Android. In Proceedings of the NDSS, 2013.
    • (2013) Proceedings of the NDSS
    • Smalley, S.1    Craig, R.2
  • 31
    • 85180622320 scopus 로고    scopus 로고
    • SMV-hunter: Large scale, automated detection of ssl/tls man-in-The-middle vulnerabilities in android apps
    • D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, and L. Khan. SMV-HUNTER: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in Android apps. In Proceedings of the NDSS, 2014.
    • (2014) Proceedings of the NDSS
    • Sounthiraraj, D.1    Sahs, J.2    Greenwood, G.3    Lin, Z.4    Khan, L.5
  • 34
  • 36
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In Proceedings of the IEEE SP, 2012.
    • (2012) Proceedings of the IEEE SP
    • Zhou, Y.1    Jiang, X.2
  • 37
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In Proceedings of the NDSS, 2012.
    • (2012) Proceedings of the NDSS
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.