-
3
-
-
84910664881
-
-
Google Bouncer. http://googlemobile.blogspot.com /2012/02/android-and-security.html.
-
Google Bouncer
-
-
-
6
-
-
84901614388
-
FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. l. Traon, D. Octeau, and P. McDaniel. FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In Proceedings of the ACM PLDI, 2014.
-
(2014)
Proceedings of the ACM PLDI
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Traon Y, L.7
Octeau, D.8
McDaniel, P.9
-
9
-
-
84866302360
-
CRePE: A system for enforcing fine-grained context-related policies on Android
-
M. Conti, B. Crispo, E. Fernandes, and Y. Zhauniarovich. CRePE: A system for enforcing fine-grained context-related policies on Android. Information Forensics and Security, IEEE Transactions on, 7(5):1426-1438, 2012.
-
(2012)
Information Forensics and Security IEEE Transactions on
, vol.7
, Issue.5
, pp. 1426-1438
-
-
Conti, M.1
Crispo, B.2
Fernandes, E.3
Zhauniarovich, Y.4
-
10
-
-
34948859976
-
Evaluating the effectiveness of slicing for model reduction of concurrent object-oriented programs
-
M. B. Dwyer, J. Hatcliff, M. Hoosier, V. Ranganath, Robby, and T. Wallentine. Evaluating the effectiveness of slicing for model reduction of concurrent object-oriented programs. In Proceedings of the TACAS, 2006.
-
(2006)
Proceedings of the TACAS
-
-
Dwyer, M.B.1
Hatcliff, J.2
Hoosier, M.3
Ranganath Robby, V.4
Wallentine, T.5
-
12
-
-
85076889619
-
TaintDroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An information-ow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the USENIX OSDI, 2010.
-
(2010)
Proceedings of the USENIX OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
13
-
-
84876196428
-
-
ENISA. Smartphone secure development guidelines. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/smartphone-security-1/smartphone-secure-development-guidelines, 2011.
-
(2011)
Smartphone Secure Development Guidelines
-
-
ENISA1
-
14
-
-
84869487159
-
Why eve and mallory love android: An analysis of android ssl (in) security
-
S. Fahl, M. Harbach, T. Muders, L. Baumgärtner, B. Freisleben, and M. Smith. Why Eve and Mallory love Android: An analysis of Android SSL (in) security. In Proceedings of the ACM CCS, 2012.
-
(2012)
Proceedings of the ACM CCS
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
15
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, 2011.
-
(2011)
Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
17
-
-
84889066310
-
Highly precise taint analysis for Android application
-
C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. Highly precise taint analysis for Android application. Technical report, EC SPRIDE, 2013.
-
(2013)
Technical Report EC SPRIDE
-
-
Fritz, C.1
Arzt, S.2
Rasthofer, S.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
23
-
-
84869416020
-
CHEX: Statically vetting Android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. CHEX: Statically vetting Android apps for component hijacking vulnerabilities. In Proceedings of the ACM CCS, 2012.
-
(2012)
Proceedings of the ACM CCS
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
25
-
-
85075955161
-
Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon. Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis. In Proceedings of the USENIX Security Symposium, 2013.
-
(2013)
Proceedings of the USENIX Security Symposium
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Le Traon, Y.7
-
26
-
-
84862082806
-
Semantically rich application-centric security in Android
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in Android. Security and Communication Networks, 5(6):658-673, 2012.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.6
, pp. 658-673
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
29
-
-
0030263395
-
Precise interprocedural dataow analysis with applications to constant propagation
-
M. Sagiv, T. Reps, and S. Horwitz. Precise interprocedural dataow analysis with applications to constant propagation. Theoretical Computer Science, 167(1):131-170, 1996.
-
(1996)
Theoretical Computer Science
, vol.167
, Issue.1
, pp. 131-170
-
-
Sagiv, M.1
Reps, T.2
Horwitz, S.3
-
30
-
-
85091276968
-
Security enhanced (se) android: Bringing exible mac to android
-
S. Smalley and R. Craig. Security enhanced (SE) Android: Bringing exible MAC to Android. In Proceedings of the NDSS, 2013.
-
(2013)
Proceedings of the NDSS
-
-
Smalley, S.1
Craig, R.2
-
31
-
-
85180622320
-
SMV-hunter: Large scale, automated detection of ssl/tls man-in-The-middle vulnerabilities in android apps
-
D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, and L. Khan. SMV-HUNTER: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in Android apps. In Proceedings of the NDSS, 2014.
-
(2014)
Proceedings of the NDSS
-
-
Sounthiraraj, D.1
Sahs, J.2
Greenwood, G.3
Lin, Z.4
Khan, L.5
-
32
-
-
0002217889
-
Optimizing Java bytecode using the Soot framework: Is it feasible?
-
R. Vallfiee-Rai, E. Gagnon, L. Hendren, P. Lam, P. Pominville, and V. Sundaresan. Optimizing Java bytecode using the Soot framework: Is it feasible? In Proceedings of the Compiler Construction, 2000.
-
(2000)
Proceedings of the Compiler Construction
-
-
Vallfiee-Rai, R.1
Gagnon, E.2
Hendren, L.3
Lam, P.4
Pominville, P.5
Sundaresan, V.6
-
36
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In Proceedings of the IEEE SP, 2012.
-
(2012)
Proceedings of the IEEE SP
-
-
Zhou, Y.1
Jiang, X.2
-
37
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In Proceedings of the NDSS, 2012.
-
(2012)
Proceedings of the NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|