메뉴 건너뛰기




Volumn , Issue , 2014, Pages 40-49

DroidForce: Enforcing complex, data-centric, system-wide policies in android

Author keywords

Android; Data flow; Data centric; Enforcement; Policy; System wide

Indexed keywords

PUBLIC POLICY; SECURITY OF DATA; SMARTPHONES;

EID: 84920622630     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2014.13     Document Type: Conference Paper
Times cited : (64)

References (35)
  • 1
    • 84887435328 scopus 로고    scopus 로고
    • International Data Corporation Nov.
    • International Data Corporation, "Worldwide quarterly mobile phone tracker 3q12," Nov. 2012, http://www. idc. com/tracker/showproductinfo. jsp?prod id=37.
    • (2012) Worldwide Quarterly Mobile Phone Tracker 3q12
  • 4
    • 84920552007 scopus 로고    scopus 로고
    • April
    • "Top 10 spy software," April 2014, http://www. top10spysoftware. com/.
    • (2014) Top 10 Spy Software
  • 6
    • 84869416020 scopus 로고    scopus 로고
    • Chex: Statically vetting android apps for component hijacking vulnerabilities
    • L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, "Chex: statically vetting android apps for component hijacking vulnerabilities," in CCS 2012.
    • (2012) CCS
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.5
  • 11
    • 84883010906 scopus 로고    scopus 로고
    • Securing smartphone compartments: Approaches and solutions
    • Springer Fachmedien Wiesbaden
    • A. Alkassar, S. Schulz, C. Stble, and S. Wohlgemuth, "Securing smartphone compartments: Approaches and solutions," in ISSE 2012. Springer Fachmedien Wiesbaden, 2012, pp. 260-268.
    • (2012) ISSE 2012 , pp. 260-268
    • Alkassar, A.1    Schulz, S.2    Stble, C.3    Wohlgemuth, S.4
  • 14
    • 84920559587 scopus 로고    scopus 로고
    • Detailed analysis of android
    • M. Spreitzenbarth, "Detailed analysis of android. fakeregsms. b," http://forensics. spreitzenbarth. de/2012/02/03/ detailed-analysis-of-android-fakeregsms-b/, 2012.
    • (2012) Fakeregsms. B
    • Spreitzenbarth, M.1
  • 15
    • 84860652586 scopus 로고    scopus 로고
    • Application collusion attack on the permission-based security model and its implications for modern smartphone systems
    • Tech. Rep. 724, April
    • C. Marforio, A. Francillon, and S. Capkun, "Application collusion attack on the permission-based security model and its implications for modern smartphone systems," ETH Zurich, Tech. Rep. 724, April 2011.
    • (2011) ETH Zurich
    • Marforio, C.1    Francillon, A.2    Apkun, S.C.3
  • 17
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Mar.
    • L. Lamport, "Proving the correctness of multiprocess programs," IEEE Trans. Softw. Eng., vol. 3, no. 2, pp. 125-143, Mar. 1977.
    • (1977) IEEE Trans. Softw. Eng. , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 18
    • 84890862041 scopus 로고    scopus 로고
    • Representation-independent data usage control
    • A. Pretschner, E. Lovat, and M. Büchler, "Representation-independent data usage control," in Proc DPM 2011, 2011, pp. 122-140.
    • (2011) Proc DPM 2011 , pp. 122-140
    • Pretschner, A.1    Lovat, E.2    Büchler, M.3
  • 19
    • 84864049653 scopus 로고    scopus 로고
    • Deriving implementation-level policies for usage control enforcement
    • P. Kumari and A. Pretschner, "Deriving implementation-level policies for usage control enforcement," in Proc. CODASPY '12.
    • Proc. CODASPY '12
    • Kumari, P.1    Pretschner, A.2
  • 20
    • 85179847964 scopus 로고    scopus 로고
    • A machine-learning approach for classifying and categorizing android sources and sinks
    • Feb.
    • S. Rasthofer, S. Arzt, and E. Bodden, "A machine-learning approach for classifying and categorizing android sources and sinks," in Proc. NDSS 2014, Feb. 2014.
    • (2014) Proc. NDSS 2014
    • Rasthofer, S.1    Arzt, S.2    Bodden, E.3
  • 21
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
    • Feb.
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets," in Proc. NDSS 2012, Feb. 2012.
    • (2012) Proc. NDSS 2012
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4
  • 23
    • 84877950290 scopus 로고    scopus 로고
    • Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen, "Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale," in Proc. TRUST 2012, 2012.
    • (2012) Proc. TRUST 2012
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 24
    • 85165758676 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock android smartphones
    • M. C. Grace, Y. Zhou, Z. Wang, and X. Jiang, "Systematic detection of capability leaks in stock android smartphones," in Proc. NDSS 2012.
    • (2012) Proc. NDSS
    • Grace, M.C.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 26
    • 85075955161 scopus 로고    scopus 로고
    • Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
    • D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon, "Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis," in Proc. USENIX 2013, 2013.
    • (2013) Proc. USENIX 2013
    • Octeau, D.1    McDaniel, P.2    Jha, S.3    Bartel, A.4    Bodden, E.5    Klein, J.6    Le Traon, Y.7
  • 29
    • 85076889619 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth, "Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in OSDI, 2010, pp. 393-407.
    • (2010) OSDI , pp. 393-407
    • Enck, W.1    Gilbert, P.2    Gon Chun, B.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 32
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: Practical policy enforcement for android applications
    • R. Xu, H. Sädi, and R. Anderson, "Aurasium: practical policy enforcement for android applications," in USENIX Security 2012.
    • (2012) USENIX Security
    • Xu, R.1    Sädi, H.2    Anderson, R.3
  • 33
    • 84951771312 scopus 로고    scopus 로고
    • Appsealer: Automatic generation of vulnerabilityspecific patches for preventing component hijacking attacks in android applications
    • M. Zhang and H. Yin, "Appsealer: Automatic generation of vulnerabilityspecific patches for preventing component hijacking attacks in android applications," in Proc. NDSS 2014.
    • (2014) Proc. NDSS
    • Zhang, M.1    Yin, H.2
  • 34
    • 57049188320 scopus 로고    scopus 로고
    • Enhancing java me security support with resource usage monitoring
    • A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, "Enhancing java me security support with resource usage monitoring," in ICICS, 2008, pp. 256-266.
    • (2008) ICICS , pp. 256-266
    • Castrucci, A.1    Martinelli, F.2    Mori, P.3    Roperti, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.