-
1
-
-
84910668784
-
-
Apple Inc. Advanced app tracks. https://developer.apple.com/library/ios/documentation/iPhone/Conceptual/iPhoneOSProgrammingGuide/AdvancedAppTricks/AdvancedAppTricks.html.
-
Advanced App Tracks
-
-
Apple Inc.1
-
2
-
-
84910638016
-
-
Apple Inc. Implementing custom url schemes. https://developer.apple.com/library/ios/documentation/iPhone/Conceptual/iPhoneOSProgrammingGuide/AdvancedAppTricks/AdvancedAppTricks.html#//apple-ref/doc/uid/TP40007072-CH7-SW50.
-
Implementing Custom Url Schemes
-
-
Apple Inc.1
-
3
-
-
84891785347
-
-
Apple Inc. Uiwebview class reference. https://developer.apple.com/library/ios/documentation/uikit/reference/UIWebView-Class/Reference/Reference.html.
-
Uiwebview Class Reference
-
-
Apple Inc.1
-
4
-
-
70349233792
-
Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps
-
New York, NY, USA. ACM
-
A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Tobarra. Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps. In Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE '08, pages 1-10, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE '08
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Tobarra, L.5
-
5
-
-
85096354052
-
Authscan: Automatic extraction of web authentication protocols from implementations
-
G. Bai, J. Lei, G. Meng, S. S. Venkatraman, P. Saxena, J. Sun, Y. Liu, and J. S. Dong. Authscan: Automatic extraction of web authentication protocols from implementations. In NDSS. The Internet Society, 2013.
-
(2013)
NDSS. The Internet Society
-
-
Bai, G.1
Lei, J.2
Meng, G.3
Venkatraman, S.S.4
Saxena, P.5
Sun, J.6
Liu, Y.7
Dong, J.S.8
-
6
-
-
67449088776
-
Securing frame communication in browsers
-
June
-
A. Barth, C. Jackson, and J. C. Mitchell. Securing frame communication in browsers. Commun. ACM, 52(6):83-91, June 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.6
, pp. 83-91
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
8
-
-
85084162287
-
Setuid demystified
-
Berkeley, CA, USA. USENIX Association
-
H. Chen, D. Wagner, and D. Dean. Setuid demystified. In Proceedings of the 11th USENIX Security Symposium, pages 171-190, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 171-190
-
-
Chen, H.1
Wagner, D.2
Dean, D.3
-
9
-
-
79961035117
-
Analyzing inter-application communication in android
-
New York, NY, USA. ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, pages 239-252, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
85037073388
-
Privilege escalation attacks on android
-
Berlin, Heidelberg. Springer-Verlag
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy. Privilege escalation attacks on android. In Proceedings of the 13th International Conference on Information Security, ISC'10, pages 346-360, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 13th International Conference on Information Security, ISC'10
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
11
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
Berkeley, CA, USA. USENIX Association
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 23-23, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 23-23
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
12
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
USENIX Association
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security Symposium. USENIX Association, 2011.
-
(2011)
USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
14
-
-
84869429339
-
The most dangerous code in the world: Validating ssl certificates in non-browser software
-
New York, NY, USA. ACM
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The most dangerous code in the world: Validating ssl certificates in non-browser software. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 38-49, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
17
-
-
84910614168
-
-
Google Inc. Intent. http://developer.android.com/reference/android/content/Intent.html.
-
Intent
-
-
Google Inc.1
-
19
-
-
84910629228
-
-
Google Inc. Webview. http://developer.android.com/reference/android/webkit/WebView.html.
-
Webview
-
-
Google Inc.1
-
20
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
New York, NY, USA. ACM
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pages 101-112, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
30
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
New York, NY, USA. ACM
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: Statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 229-240, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
31
-
-
84862909641
-
Attacks on webview in the android system
-
T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin. Attacks on webview in the android system. In Annual Computer Security Applications Conference, pages 343-352, 2011.
-
(2011)
Annual Computer Security Applications Conference
, pp. 343-352
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
32
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
New York, NY, USA. ACM
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner. Addroid: Privilege separation for applications and advertisers in android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, pages 71-72, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12
, pp. 71-72
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
34
-
-
84954474056
-
Adsplit: Separating smartphone advertising from applications
-
Berkeley, CA, USA. USENIX Association
-
S. Shekhar, M. Dietz, and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. In Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, pages 28-28, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
, pp. 28-28
-
-
Shekhar, S.1
Dietz, M.2
Wallach, D.S.3
-
35
-
-
84915774545
-
On breaking saml: Be whoever you want to be
-
Berkeley, CA, USA
-
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, and M. Jensen. On breaking saml: Be whoever you want to be. In Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, pages 21-21, Berkeley, CA, USA, 2012.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
, pp. 21-21
-
-
Somorovsky, J.1
Mayer, A.2
Schwenk, J.3
Kampmann, M.4
Jensen, M.5
-
36
-
-
84875656318
-
Investigating user privacy in android ad libraries
-
R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen. Investigating user privacy in android ad libraries. In IEEE Mobile Security Technologies (MoST), 2012.
-
(2012)
IEEE Mobile Security Technologies (MoST)
-
-
Stevens, R.1
Gibler, C.2
Crussell, J.3
Erickson, J.4
Chen, H.5
-
37
-
-
84869401890
-
The devil is in the (implementation) details: An empirical analysis of oauth sso systems
-
New York, NY, USA. ACM
-
S.-T. Sun and K. Beznosov. The devil is in the (implementation) details: An empirical analysis of oauth sso systems. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 378-390, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 378-390
-
-
Sun, S.-T.1
Beznosov, K.2
-
38
-
-
84861098079
-
Systematically breaking and fixing openid security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
-
S.-T. Sun, K. Hawkey, and K. Beznosov. Systematically breaking and fixing openid security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. Computers & Security, 31(4):465-483, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 465-483
-
-
Sun, S.-T.1
Hawkey, K.2
Beznosov, K.3
-
41
-
-
84878355933
-
Signing me onto your accounts through facebook and google: A trafic-guided security study of commercially deployed single-sign-on web services
-
R. Wang, S. Chen, and X. Wang. Signing me onto your accounts through facebook and google: A trafic-guided security study of commercially deployed single-sign-on web services. In IEEE Symposium on Security and Privacy, pages 365-379, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 365-379
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
42
-
-
84889071864
-
Unauthorized origin crossing on mobile platforms: Threats and mitigation
-
New York, NY, USA. ACM
-
R. Wang, L. Xing, X. Wang, and S. Chen. Unauthorized origin crossing on mobile platforms: Threats and mitigation. In Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS '13, pages 635-646, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS '13
, pp. 635-646
-
-
Wang, R.1
Xing, L.2
Wang, X.3
Chen, S.4
-
43
-
-
84992342056
-
Explicating sdks: Uncovering assumptions underlying secure authentication and authorization
-
Berkeley, CA, USA. USENIX Association
-
R. Wang, Y. Zhou, S. Chen, S. Qadeer, D. Evans, and Y. Gurevich. Explicating sdks: Uncovering assumptions underlying secure authentication and authorization. In Proceedings of the 22Nd USENIX Conference on Security, SEC'13, pages 399-414, Berkeley, CA, USA, 2013. USENIX Association.
-
(2013)
Proceedings of the 22Nd USENIX Conference on Security, SEC'13
, pp. 399-414
-
-
Wang, R.1
Zhou, Y.2
Chen, S.3
Qadeer, S.4
Evans, D.5
Gurevich, Y.6
|