-
1
-
-
84887435328
-
-
International Data Corporation Nov.
-
International Data Corporation, "Worldwide quarterly mobile phone tracker 3q12," Nov. 2012, http://www. idc. com/tracker/showproductinfo. jsp?prod id=37.
-
(2012)
Worldwide Quarterly Mobile Phone Tracker 3q12
-
-
-
4
-
-
84920552007
-
-
April
-
"Top 10 spy software," April 2014, http://www. top10spysoftware. com/.
-
(2014)
Top 10 Spy Software
-
-
-
5
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel, "Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps," in Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, 2014, p. 29.
-
(2014)
Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM
, pp. 29
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
6
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, "Chex: statically vetting android apps for component hijacking vulnerabilities," in CCS 2012.
-
(2012)
CCS
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
8
-
-
84893601570
-
ScanDal: Static analyzer for detecting privacy leaks in android applications
-
May
-
J. Kim, Y. Yoon, K. Yi, and J. Shin, "ScanDal: Static analyzer for detecting privacy leaks in android applications," in MoST 2012: Mobile Security Technologies 2012. IEEE, May 2012.
-
(2012)
MoST 2012: Mobile Security Technologies 2012. IEEE
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
-
11
-
-
84883010906
-
Securing smartphone compartments: Approaches and solutions
-
Springer Fachmedien Wiesbaden
-
A. Alkassar, S. Schulz, C. Stble, and S. Wohlgemuth, "Securing smartphone compartments: Approaches and solutions," in ISSE 2012. Springer Fachmedien Wiesbaden, 2012, pp. 260-268.
-
(2012)
ISSE 2012
, pp. 260-268
-
-
Alkassar, A.1
Schulz, S.2
Stble, C.3
Wohlgemuth, S.4
-
12
-
-
38049040380
-
A policy language for distributed usage control
-
Springer-Verlag
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, "A policy language for distributed usage control," in Proc. 12th Europ. Conf. on Research in Computer Security. Springer-Verlag, pp. 531-546.
-
Proc. 12th Europ. Conf. on Research in Computer Security
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
13
-
-
33646843643
-
Soot-a java bytecode optimization framework
-
IBM Press
-
R. Vallée-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan, "Soot-a java bytecode optimization framework," in Proc. 1999 Conf. of Centre for Advanced Studies on Collaborative Research. IBM Press.
-
Proc. 1999 Conf. of Centre for Advanced Studies on Collaborative Research
-
-
Vallée-Rai, R.1
Co, P.2
Gagnon, E.3
Hendren, L.4
Lam, P.5
Sundaresan, V.6
-
14
-
-
84920559587
-
Detailed analysis of android
-
M. Spreitzenbarth, "Detailed analysis of android. fakeregsms. b," http://forensics. spreitzenbarth. de/2012/02/03/ detailed-analysis-of-android-fakeregsms-b/, 2012.
-
(2012)
Fakeregsms. B
-
-
Spreitzenbarth, M.1
-
15
-
-
84860652586
-
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
-
Tech. Rep. 724, April
-
C. Marforio, A. Francillon, and S. Capkun, "Application collusion attack on the permission-based security model and its implications for modern smartphone systems," ETH Zurich, Tech. Rep. 724, April 2011.
-
(2011)
ETH Zurich
-
-
Marforio, C.1
Francillon, A.2
Apkun, S.C.3
-
17
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Mar.
-
L. Lamport, "Proving the correctness of multiprocess programs," IEEE Trans. Softw. Eng., vol. 3, no. 2, pp. 125-143, Mar. 1977.
-
(1977)
IEEE Trans. Softw. Eng.
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
18
-
-
84890862041
-
Representation-independent data usage control
-
A. Pretschner, E. Lovat, and M. Büchler, "Representation-independent data usage control," in Proc DPM 2011, 2011, pp. 122-140.
-
(2011)
Proc DPM 2011
, pp. 122-140
-
-
Pretschner, A.1
Lovat, E.2
Büchler, M.3
-
19
-
-
84864049653
-
Deriving implementation-level policies for usage control enforcement
-
P. Kumari and A. Pretschner, "Deriving implementation-level policies for usage control enforcement," in Proc. CODASPY '12.
-
Proc. CODASPY '12
-
-
Kumari, P.1
Pretschner, A.2
-
20
-
-
85179847964
-
A machine-learning approach for classifying and categorizing android sources and sinks
-
Feb.
-
S. Rasthofer, S. Arzt, and E. Bodden, "A machine-learning approach for classifying and categorizing android sources and sinks," in Proc. NDSS 2014, Feb. 2014.
-
(2014)
Proc. NDSS 2014
-
-
Rasthofer, S.1
Arzt, S.2
Bodden, E.3
-
21
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
-
Feb.
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets," in Proc. NDSS 2012, Feb. 2012.
-
(2012)
Proc. NDSS 2012
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
23
-
-
84877950290
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen, "Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale," in Proc. TRUST 2012, 2012.
-
(2012)
Proc. TRUST 2012
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
24
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
M. C. Grace, Y. Zhou, Z. Wang, and X. Jiang, "Systematic detection of capability leaks in stock android smartphones," in Proc. NDSS 2012.
-
(2012)
Proc. NDSS
-
-
Grace, M.C.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
25
-
-
84903569299
-
Analyzing interapplication communication in android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing interapplication communication in android," in Proc. MobiSys 2011, 2011.
-
(2011)
Proc. MobiSys 2011
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
26
-
-
85075955161
-
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon, "Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis," in Proc. USENIX 2013, 2013.
-
(2013)
Proc. USENIX 2013
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Le Traon, Y.7
-
27
-
-
84872351831
-
-
Tech. Rep.
-
M. Backes, S. Gerling, C. Hammer, M. Maffei, and P. von Styp-Rekowsky, "Appguard-real-time policy enforcement for third-party applications," Tech. Rep., 2012.
-
(2012)
Appguard-real-time Policy Enforcement for Third-party Applications
-
-
Backes, M.1
Gerling, S.2
Hammer, C.3
Maffei, M.4
Von Styp-Rekowsky, P.5
-
28
-
-
84920553391
-
Kynoid: Realtime enforcement of fine-grained, user-defined, and data-centric security policies for android
-
D. Schreckling, J. Posegga, J. Kstler, and M. Schaff, "Kynoid: Realtime enforcement of fine-grained, user-defined, and data-centric security policies for android," in Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012.
-
(2012)
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
-
-
Schreckling, D.1
Posegga, J.2
Kstler, J.3
Schaff, M.4
-
29
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth, "Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in OSDI, 2010, pp. 393-407.
-
(2010)
OSDI
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
31
-
-
80755167433
-
Xmandroid: A new android evolution to mitigate privilege escalation attacks
-
Tech. Rep., Apr.
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, "Xmandroid: A new android evolution to mitigate privilege escalation attacks," Technische Universität Darmstadt, Tech. Rep., Apr. 2011.
-
(2011)
Technische Universität Darmstadt
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
32
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
R. Xu, H. Sädi, and R. Anderson, "Aurasium: practical policy enforcement for android applications," in USENIX Security 2012.
-
(2012)
USENIX Security
-
-
Xu, R.1
Sädi, H.2
Anderson, R.3
-
33
-
-
84951771312
-
Appsealer: Automatic generation of vulnerabilityspecific patches for preventing component hijacking attacks in android applications
-
M. Zhang and H. Yin, "Appsealer: Automatic generation of vulnerabilityspecific patches for preventing component hijacking attacks in android applications," in Proc. NDSS 2014.
-
(2014)
Proc. NDSS
-
-
Zhang, M.1
Yin, H.2
-
34
-
-
57049188320
-
Enhancing java me security support with resource usage monitoring
-
A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, "Enhancing java me security support with resource usage monitoring," in ICICS, 2008, pp. 256-266.
-
(2008)
ICICS
, pp. 256-266
-
-
Castrucci, A.1
Martinelli, F.2
Mori, P.3
Roperti, F.4
-
35
-
-
63449083259
-
A flexible security architecture to support third-party applications on mobile devices
-
L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts, F. Piessens, and D. Vanoverberghe, "A flexible security architecture to support third-party applications on mobile devices," in Proc. 2007 ACM Workshop on Computer Security Architecture, ser. CSAW '07.
-
Proc. 2007 ACM Workshop on Computer Security Architecture, Ser. CSAW '07
-
-
Desmet, L.1
Joosen, W.2
Massacci, F.3
Naliuka, K.4
Philippaerts, P.5
Piessens, F.6
Vanoverberghe, D.7
|