메뉴 건너뛰기




Volumn 35, Issue 1, 2015, Pages 44-53

VulHunter: Toward discovering vulnerabilities in android applications

Author keywords

Android applications; app property graph; static analysis; vulnerabilities detection

Indexed keywords

MOBILE SECURITY; STATIC ANALYSIS;

EID: 84925070537     PISSN: 02721732     EISSN: None     Source Type: Journal    
DOI: 10.1109/MM.2015.25     Document Type: Article
Times cited : (32)

References (7)
  • 1
    • 84914182764 scopus 로고    scopus 로고
    • Modeling and discovering vulnerabilities with code property graphs
    • F. Yamaguchi et al., "Modeling and Discovering Vulnerabilities with Code Property Graphs," Proc. IEEE Symp. Security and Privacy, 2014, pp. 590-604.
    • (2014) Proc. IEEE Symp. Security and Privacy , pp. 590-604
    • Yamaguchi, F.1
  • 2
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. King, "Symbolic Execution and Program Testing," Comm. ACM, vol. 19, no. 7, 1976, pp. 385-394.
    • (1976) Comm. ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.1
  • 5
    • 85165758676 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock android smartphones
    • M. Grace et al., "Systematic Detection of Capability Leaks in Stock Android Smartphones," Proc. Network and Distributed System Security Symp. (NDSS 12), 2012; www .internetsociety.org/systematic-detection-capability-leaks-stock-android-smartphones.
    • (2012) Proc. Network and Distributed System Security Symp. (NDSS 12)
    • Grace, M.1
  • 7
    • 85180622320 scopus 로고    scopus 로고
    • SMV-hunter: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in android apps
    • D. Sounthiraraj et al., "SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps," Proc. Network and Distributed System Security Symp. (NDSS 14), 2014; www.internetsociety.org/doc/smv-hunter-large-scale-automated-detection-ssltls-man-middle-vulnerabilities-android-apps.
    • (2014) Proc. Network and Distributed System Security Symp. (NDSS 14)
    • Sounthiraraj, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.