-
1
-
-
14744275332
-
Privacy and rationality in individual decision making
-
A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. Security & Privacy, IEEE, 3(1):26-33, 2005.
-
(2005)
Security & Privacy, IEEE
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
2
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 217-228. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
3
-
-
36549070602
-
Evaluating static analysis defect warnings on production software
-
ACM
-
N. Ayewah, W. Pugh, J. D. Morgenthaler, J. Penix, and Y. Zhou. Evaluating static analysis defect warnings on production software. In Proceedings of the 7th ACM SIGPLANSIGSOFT workshop on Program analysis for software tools and engineering, pages 1-8. ACM, 2007.
-
(2007)
Proceedings of the 7th ACM SIGPLANSIGSOFT Workshop on Program Analysis for Software Tools and Engineering
, pp. 1-8
-
-
Ayewah, N.1
Pugh, W.2
Morgenthaler, J.D.3
Penix, J.4
Zhou, Y.5
-
7
-
-
80755187788
-
Android permissions demystified
-
ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627-638. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
11
-
-
0016555241
-
The Protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
12
-
-
84888986424
-
Asking for (and about) permissions used by android apps
-
IEEE Press
-
R. Stevens, J. Ganz, V. Filkov, P. Devanbu, and H. Chen. Asking for (and about) permissions used by android apps. In Proceedings of the Tenth International Workshop on Mining Software Repositories, pages 31-40. IEEE Press, 2013.
-
(2013)
Proceedings of the Tenth International Workshop on Mining Software Repositories
, pp. 31-40
-
-
Stevens, R.1
Ganz, J.2
Filkov, V.3
Devanbu, P.4
Chen, H.5
-
15
-
-
84872101378
-
Permission evolution in the android ecosystem
-
ACM
-
X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos. Permission evolution in the android ecosystem. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 31-40. ACM, 2012.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference
, pp. 31-40
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
16
-
-
84855693683
-
Aside: Ide support for web application security
-
ACM
-
J. Xie, B. Chu, H. R. Lipford, and J. T. Melton. Aside: Ide support for web application security. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 267-276. ACM, 2011.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference
, pp. 267-276
-
-
Xie, J.1
Chu, B.2
Lipford, H.R.3
Melton, J.T.4
|