-
1
-
-
84922722992
-
Adding trace matching with free variables to
-
[AAC+05] Chris Allan, Pavel Avgustinov, Aske Simon Christensen, Laurie Hendren, Sascha Kuzins, Ondrej Lhoták, Oege de Moor, Damien Sereni, Ganesh Sittampalam, Julian Tibble. Adding trace matching with free variables to AspectJ. In [OOP05].
-
AspectJ. In [OOP05] [AAC+05]
-
-
Allan, C.1
Avgustinov, P.2
Christensen, A.S.3
Hendren, L.4
Kuzins, S.5
Lhoták, O.6
De Moor, O.7
Sereni, D.8
Sittampalam, G.9
Tibble, J.10
-
2
-
-
70450227738
-
The dataflow pointcut: A formal and practical framework
-
[ABB+09], New York, NY, USA. ACM
-
[ABB+09] Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, Mourad Debbabi, and Prabir Bhattacharya. The dataflow pointcut: a formal and practical framework. In Proceedings of the 8th ACM international conference on Aspect-oriented software development, AOSD '09, pages 15-26, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 8th ACM International Conference on Aspect-Oriented Software Development, AOSD '09
, pp. 15-26
-
-
Alhadidi, D.1
Boukhtouta, A.2
Belblidia, N.3
Debbabi, M.4
Bhattacharya, P.5
-
8
-
-
51949108337
-
Mop: An efficient and generic runtime verification framework
-
[CR07], New York, NY, USA. ACM
-
[CR07] Feng Chen and Grigore Roşu. MOP: an efficient and generic runtime verification framework. In Proceedings of the 22nd annual ACM SIGPLAN conference on Objectoriented programming systems and applications, OOPSLA '07, pages 569-588, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 22nd Annual ACM SIGPLAN Conference on Objectoriented Programming Systems and Applications, OOPSLA '07
, pp. 569-588
-
-
Chen, F.1
Roşu, G.2
-
9
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
[EGgC+10] In Remzi H. Arpaci-Dusseau and Brad Chen, editors. USENIX Association
-
[EGgC+10] William Enck, Peter Gilbert, Byung gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Remzi H. Arpaci-Dusseau and Brad Chen, editors, OSDI, pages 393-407. USENIX Association, 2010.
-
(2010)
OSDI
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
10
-
-
85025700509
-
A study of android application security
-
[EOMC11], Berkeley, CA, USA. USENIX Association
-
[EOMC11] William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A study of Android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21-21, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
12
-
-
84869487159
-
Why eve and mallory love android: An analysis of android ssl (in)security
-
[FHM+12], New York, NY, USA. ACM
-
[FHM+12] Sascha Fahl, Marian Harbach, Thomas Muders, Lars Baumgärtner, Bernd Freisleben, and Matthew Smith. Why Eve and Mallory love Android: an analysis of android SSL (in)security. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 50-61, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
13
-
-
84863084209
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
[GCEC12]. Springer
-
[GCEC12] Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, pages 291-307. Springer, 2012.
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST'12
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
14
-
-
84922711449
-
-
[Goo12] December
-
[Goo12] Google Inc. Permissions, December 2012. http://developer.android.com/guide/topics/security/permissions.html.
-
(2012)
Google Inc. Permissions
-
-
-
17
-
-
82955230066
-
An overview of aspectj
-
[KHH+01]. Springer
-
[KHH+01] G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. Griswold. An overview of AspectJ. In ECOOP, pages 327-354. Springer, 2001.
-
(2001)
ECOOP
, pp. 327-354
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.6
-
19
-
-
0345445932
-
Dataflow pointcut in aspect-oriented programming
-
[MK03] In Atsushi Ohori, editor, of Lecture Notes in Computer Science. Springer
-
[MK03] Hidehiko Masuhara and Kazunori Kawauchi. Dataflow Pointcut in Aspect-Oriented Programming. In Atsushi Ohori, editor, Programming Languages and Systems, volume 2895 of Lecture Notes in Computer Science, pages 105-121. Springer, 2003.
-
(2003)
Programming Languages and Systems
, vol.2895
, pp. 105-121
-
-
Masuhara, H.1
Kawauchi, K.2
-
21
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
[NKZ10], New York, NY, USA. ACM
-
[NKZ10] Mohammad Nauman, Sohail Khan, and Xinwen Zhang. Apex: extending Android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pages 328-332, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
23
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
[ZJ12]
-
[ZJ12] Yajin Zhou and Xuxian Jiang. Dissecting Android Malware: Characterization and Evolution. In IEEE Symposium on Security and Privacy, pages 95-109, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
24
-
-
85037359376
-
Taming informationstealing smartphone applications (on android)
-
[ZZJF11]. Springer
-
[ZZJF11] Yajin Zhou, Xinwen Zhang, Xuxian Jiang, and Vincent W. Freeh. Taming informationstealing smartphone applications (on Android). In Proc. of the 4th international conference on Trust and trustworthy computing, TRUST'11, pages 93-107. Springer, 2011.
-
(2011)
Proc. of the 4th International Conference on Trust and Trustworthy Computing, TRUST'11
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|