-
1
-
-
84918829173
-
-
Android Developers, Security Tips
-
Android Developers, Security Tips ().
-
-
-
-
2
-
-
84889049230
-
Ubiquitous patient monitoring and smart alert generation in an intensive care unit supported by low cost tablet PC based automation system powered through open source software
-
J. Antony, B. Vijayan, S. Joy, G. Santhoshkumar, N. Chandran, Ubiquitous patient monitoring and smart alert generation in an intensive care unit supported by low cost tablet PC based automation system powered through open source software, in: Proceedings of the Global Humanitarian Technology Conference: South Asia Satellite, 2013, pp. 334-339.
-
(2013)
Proceedings of the Global Humanitarian Technology Conference: South Asia Satellite
, pp. 334-339
-
-
Antony, J.1
Vijayan, B.2
Joy, S.3
Santhoshkumar, G.4
Chandran, N.5
-
3
-
-
84918824116
-
-
Apple, App Store Review Guidelines, Cupertino, California
-
Apple, App Store Review Guidelines, Cupertino, California (), 2013.
-
(2013)
-
-
-
4
-
-
84886433245
-
Formal modeling and reasoning about the Android Security Framework
-
A. Armando, G. Costa, A. Merlo, Formal modeling and reasoning about the Android Security Framework, in: Proceedings of the Seventh International Symposium on Trustworthy Global Computing, 2012, pp. 64-81.
-
(2012)
Proceedings of the Seventh International Symposium on Trustworthy Global Computing
, pp. 64-81
-
-
Armando, A.1
Costa, G.2
Merlo, A.3
-
5
-
-
84877970136
-
Bring your own device, securely
-
A. Armando, G. Costa A. Merlo, L. Verderame, Bring your own device, securely, in: Proceedings of the Twenty-Eighth ACM Symposium on Applied Computing, 2013, pp. 1852-1858.
-
(2013)
Proceedings of the Twenty-Eighth ACM Symposium on Applied Computing
, pp. 1852-1858
-
-
Armando, A.1
Merlo, G.C.A.2
Verderame, L.3
-
6
-
-
84863954784
-
Would you mind forking this process? A denial-of-service attack on Android (and some countermeasures)
-
A. Armando, A. Merlo, M. Migliardi, L. Verderame, Would you mind forking this process? A denial-of-service attack on Android (and some countermeasures), in: Proceedings of the Twenty-Seventh IFIP International Information Security and Privacy Conference, 2012, pp. 13-24.
-
(2012)
Proceedings of the Twenty-Seventh IFIP International Information Security and Privacy Conference
, pp. 13-24
-
-
Armando, A.1
Merlo, A.2
Migliardi, M.3
Verderame, L.4
-
7
-
-
84888289162
-
Breaking and fixing the Android launching flow
-
A. Armando, A. Merlo, M. Migliardi, L. Verderame, Breaking and fixing the Android launching flow, Comput. Secur. 39(A) (2013) 104-115.
-
(2013)
Comput. Secur.
, vol.39
, Issue.A
, pp. 104-115
-
-
Armando, A.1
Merlo, A.2
Migliardi, M.3
Verderame, L.4
-
8
-
-
78651410113
-
An Android application sandbox system for suspicious software detection
-
T. Blasing, L. Batyuk, A. Schmidt, S. Camtepe, S. Albayrak, An Android application sandbox system for suspicious software detection, in: Proceedings of the Fifth International Conference on Malicious and Unwanted Software, 2010, pp. 55-62.
-
(2010)
Proceedings of the Fifth International Conference on Malicious and Unwanted Software
, pp. 55-62
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.3
Camtepe, S.4
Albayrak, S.5
-
9
-
-
84874123081
-
Anatomy and physiology of an Android
-
Google I/O
-
P. Brady, Anatomy and physiology of an Android, Google I/O, 2008.
-
(2008)
-
-
Brady, P.1
-
10
-
-
80755143401
-
Crowdroid: behavior-based malware detection system for Android
-
I. Burguera, U. Zurutuza, S. Nadjm-Therani, Crowdroid: behavior-based malware detection system for Android, in: Proceedings of the First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, 2011, pp. 15-26.
-
(2011)
Proceedings of the First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Therani, S.3
-
12
-
-
79961035117
-
Analyzing inter-application communication in Android
-
E. Chin, A. Porter Felt, K. Greenwood, D. Wagner, Analyzing inter-application communication in Android, in: Proceedings of the Ninth International Conference on Mobile Systems, Applications and Services, 2011, pp. 239-252.
-
(2011)
Proceedings of the Ninth International Conference on Mobile Systems, Applications and Services
, pp. 239-252
-
-
Chin, E.1
Porter Felt, A.2
Greenwood, K.3
Wagner, D.4
-
13
-
-
84918839909
-
Computer networks in South Korea are paralyzed in cyberattacks
-
New York Times, March 20
-
S. Choe, Computer networks in South Korea are paralyzed in cyberattacks, New York Times, March 20, 2013.
-
(2013)
-
-
Choe, S.1
-
14
-
-
84918792653
-
-
Fort Lauderdale, Florida
-
Citrix, IT Organizations Embrace Bring-Your-Own Devices, Fort Lauderdale, Florida, 2013.
-
(2013)
-
-
-
15
-
-
84918771846
-
Kill timer found in Shamoon malware suggests possible connection to Saudi Aramco attack
-
August 23
-
L. Constantin, Kill timer found in Shamoon malware suggests possible connection to Saudi Aramco attack, Computerworld, August 23, 2012.
-
(2012)
Computerworld
-
-
Constantin, L.1
-
16
-
-
85037073388
-
Privilege escalation attacks on Android
-
L. Davi, A. Dmitrienko, A. Sadeghi, M. Winandy, Privilege escalation attacks on Android, in: Proceedings of the Thirteenth International Conference on Information Security, 2011, pp. 346-360.
-
(2011)
Proceedings of the Thirteenth International Conference on Information Security
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.3
Winandy, M.4
-
17
-
-
84918815181
-
-
FierceMobileIT, September 27
-
National Australia Bank hangs up on desk phones, trials BYOD, FierceMobileIT, September 27, 2013.
-
(2013)
-
-
-
19
-
-
84918813113
-
Tales from the darkside: Mobile malware brings down Korean banks
-
Fielder, RSA Security Analytics, March 21
-
Fielder, Tales from the darkside: Mobile malware brings down Korean banks, RSA Security Analytics, March 21, 2013.
-
-
-
-
20
-
-
84918803209
-
-
July-September 2013, Technical Report, Helsinki, Finland
-
F-Secure Labs, Mobile Threat Report, July-September 2013, Technical Report, Helsinki, Finland, 2013.
-
(2013)
-
-
-
21
-
-
79955904273
-
SCanDroid: Automated Security Certication of Android Applications
-
Technical Report, Department of Computer Science, University of Maryland, College Park, Maryland
-
A. Fuchs, A. Chaudhuri, J. Foster, SCanDroid: Automated Security Certication of Android Applications, Technical Report, Department of Computer Science, University of Maryland, College Park, Maryland, 2009.
-
(2009)
-
-
Fuchs, A.1
Chaudhuri, A.2
Foster, J.3
-
22
-
-
84876758444
-
Towards a user-friendly security-enhancing BYOD solution
-
D. Gessner, J. Girao, G. Karame, W. Li, Towards a user-friendly security-enhancing BYOD solution, NEC Tech. J. 7(3) (2013) 113-116.
-
(2013)
NEC Tech. J.
, vol.7
, Issue.3
, pp. 113-116
-
-
Gessner, D.1
Girao, J.2
Karame, G.3
Li, W.4
-
23
-
-
84918821786
-
Water treatment plant uses iPads to monitor systems
-
October 16
-
M. Hamblen, Haverhill, MA, Water treatment plant uses iPads to monitor systems, Computerworld, October 16, 2012.
-
(2012)
Computerworld
-
-
Hamblen, M.1
Haverhill, M.A.2
-
24
-
-
0012583283
-
Featherweight Java: a minimal core calculus for Java and GJ, ACM Trans.
-
A. Igarashi, B. Pierce, P. Wadler, Featherweight Java: a minimal core calculus for Java and GJ, ACM Trans. Program. Lang. Syst. 23(3) (2001) 396-450.
-
(2001)
Program. Lang. Syst.
, vol.23
, Issue.3
, pp. 396-450
-
-
Igarashi, A.1
Pierce, B.2
Wadler, P.3
-
25
-
-
84883240396
-
Development of mobile radiation monitoring system utilizing smartphone and its field tests in Fukushima
-
Y. Ishigaki, Y. Matsumoto, R. Ichimiya, K. Tanaka, Development of mobile radiation monitoring system utilizing smartphone and its field tests in Fukushima, IEEE Sensors J. 13(10) (2013) 3520-3526.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3520-3526
-
-
Ishigaki, Y.1
Matsumoto, Y.2
Ichimiya, R.3
Tanaka, K.4
-
26
-
-
84875625388
-
An Android-enabled mobile framework for ubiquitous access to cloud emergency medical services
-
V. Koufi, F. Malamateniou, G. Vassilacopoulos, A. Prentza, An Android-enabled mobile framework for ubiquitous access to cloud emergency medical services, in: Proceedings of the Second Symposium on Network Cloud Computing and Applications, 2013, pp. 95-101.
-
(2013)
Proceedings of the Second Symposium on Network Cloud Computing and Applications
, pp. 95-101
-
-
Koufi, V.1
Malamateniou, F.2
Vassilacopoulos, G.3
Prentza, A.4
-
27
-
-
84865574920
-
Android and security, Google Mobile Blog
-
February 2
-
H. Lockheimer, Android and security, Google Mobile Blog , February 2, 2012. http://googlemobile.blogspot.com/2012/02/android-and-security.html.
-
(2012)
-
-
Lockheimer, H.1
-
28
-
-
84862909641
-
Attacks on WebView in the Android system
-
T. Luo, H. Hao, W. Du, Y. Wang, H. Yin, Attacks on WebView in the Android system, in: Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011, pp. 343-352.
-
(2011)
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference
, pp. 343-352
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
29
-
-
80052493767
-
Smartphone security evaluation: the malware attack case
-
A. Mylonas, S. Dritsas, B. Tsoumas, D. Gritzalis, Smartphone security evaluation: the malware attack case, in: Proceedings of the International Conference on Security and Cryptography, 2011, pp. 25-36.
-
(2011)
Proceedings of the International Conference on Security and Cryptography
, pp. 25-36
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
30
-
-
84880088344
-
CLIPS: Infrastructure-free collaborative indoor positioning scheme for time-critical team operations
-
Y. Noh, H. Yamaguchi, U. Lee, P. Vij, J. Joy, M. Gerla, CLIPS: Infrastructure-free collaborative indoor positioning scheme for time-critical team operations, in: Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2013, pp. 172-178.
-
(2013)
Proceedings of the IEEE International Conference on Pervasive Computing and Communications
, pp. 172-178
-
-
Noh, Y.1
Yamaguchi, H.2
Lee, U.3
Vij, P.4
Joy, J.5
Gerla, M.6
-
31
-
-
84868107162
-
Dissecting the Android Bouncer
-
Presented at the SummerCon Conference
-
J. Oberheide, C. Miller, Dissecting the Android Bouncer, Presented at the SummerCon Conference, 2012.
-
(2012)
-
-
Oberheide, J.1
Miller, C.2
-
32
-
-
33745446320
-
Slammer worm crashed Ohio nuke plant network
-
August 19
-
K. Poulsen, Slammer worm crashed Ohio nuke plant network, SecurityFocus, August 19, 2003.
-
(2003)
SecurityFocus
-
-
Poulsen, K.1
-
33
-
-
84857164924
-
Soundcomber: a stealthy and context-aware sound Trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, X. Wang, Soundcomber: a stealthy and context-aware sound Trojan for smartphones, in: Proceedings of the Eighteenth Annual Network and Distributed System Security Symposium, 2011.
-
(2011)
Proceedings of the Eighteenth Annual Network and Distributed System Security Symposium
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
34
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on Android
-
A. Schmidt, R. Bye, H. Schmidt, J. Clausen, O. Kiraz, K. Yuksel, S. Camtepe, S. Albayrak, Static analysis of executables for collaborative malware detection on Android, in: Proceedings of the IEEE International Conference on Communications, 2009, pp. 631-635.
-
(2009)
Proceedings of the IEEE International Conference on Communications
, pp. 631-635
-
-
Schmidt, A.1
Bye, R.2
Schmidt, H.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.6
Camtepe, S.7
Albayrak, S.8
-
35
-
-
77950675112
-
Google Android: a comprehensive security assessment
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, Google Android: a comprehensive security assessment, IEEE Secur. Priv. 8(2) (2010) 35-44.
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
36
-
-
84918833280
-
Using STPA in the design of a nuclear power plant control room
-
Presented at the MIT STAMP/STPA Workshop
-
A. Stephane, Using STPA in the design of a nuclear power plant control room, Presented at the MIT STAMP/STPA Workshop, 2012.
-
(2012)
-
-
Stephane, A.1
-
37
-
-
84857696369
-
BYOD: enabling the chaos
-
G. Thomson, BYOD: enabling the chaos, Netw. Secur. 2012(2) (2012) 5-8.
-
(2012)
Netw. Secur.
, vol.2012
, Issue.2
, pp. 5-8
-
-
Thomson, G.1
-
38
-
-
84906743353
-
Jekyll on iOS: when benign apps become evil
-
T. Wang, K. Lu, L. Lu, S. Chung, W. Lee, Jekyll on iOS: when benign apps become evil, in: Proceedings of the Twenty-Second USENIX Security Symposium, 2013, pp. 559-572.
-
(2013)
Proceedings of the Twenty-Second USENIX Security Symposium
, pp. 559-572
-
-
Wang, T.1
Lu, K.2
Lu, L.3
Chung, S.4
Lee, W.5
-
39
-
-
84918786323
-
-
eighth edition, Cologny/Geneva, Switzerland
-
World Economic Forum, Global Risks 2013, eighth edition, Cologny/Geneva, Switzerland, 2013.
-
(2013)
-
-
-
40
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
-
Y. Zhou, Z. Wang, W. Zhou, X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets, in: Proceedings of the Nineteenth Annual Network and Distributed System Security Symposium, 2012.
-
(2012)
Proceedings of the Nineteenth Annual Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|