-
1
-
-
84928119742
-
-
Androidrank. http://www.androidrank.org/.
-
Androidrank
-
-
-
4
-
-
34249668253
-
Knowing the user's every move: User activity tracking for website usability evaluation and implicit interaction
-
R. Atterer, M. Wnuk, and A. Schmidt. Knowing the user's every move: User activity tracking for website usability evaluation and implicit interaction. In Proceedings of ACM WWW, 2006.
-
(2006)
Proceedings of ACM WWW
-
-
Atterer, R.1
Wnuk, M.2
Schmidt, A.3
-
5
-
-
84858438065
-
Characterizing user navigation and interactions in online social networks
-
July
-
F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user navigation and interactions in online social networks. Inf. Sci., July 2012.
-
(2012)
Inf. Sci
-
-
Benevenuto, F.1
Rodrigues, T.2
Cha, M.3
Almeida, V.4
-
9
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Proceedings of IEEE S&P, 2010.
-
(2010)
Proceedings of IEEE S&P
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
10
-
-
84910657043
-
Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities
-
Springer
-
M. Conti, N. Dragoni, and S. Gottardo. Mithys: Mind the hand you shake-protecting mobile devices from ssl usage vulnerabilities. In Security and Trust Management. Springer, 2013.
-
(2013)
Security and Trust Management
-
-
Conti, M.1
Dragoni, N.2
Gottardo, S.3
-
11
-
-
84883095467
-
Networkprofiler: Towards automatic fingerprinting of android apps
-
S. Dai, A. Tongaonkar, X. Wang, A. Nucci, and D. Song. Networkprofiler: Towards automatic fingerprinting of android apps. In Proceedings of IEEE INFOCOM, 2013.
-
(2013)
Proceedings of IEEE INFOCOM
-
-
Dai, S.1
Tongaonkar, A.2
Wang, X.3
Nucci, A.4
Song, D.5
-
13
-
-
84878355718
-
Peek-A-boo, I still see you: Why efficient traffic analysis countermeasures fail
-
K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, I still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of IEEE S&P, 2012.
-
(2012)
Proceedings of IEEE S&P
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
14
-
-
85076889619
-
Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones. In Proceedings of USENIX OSDI, 2010.
-
(2010)
Proceedings of USENIX OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
15
-
-
84869487159
-
Why eve and mallory love android: An analysis of android ssl (in)security
-
S. Fahl, M. Harbach, T. Muders, L. Baumgärtner, B. Freisleben, and M. Smith. Why eve and mallory love android: An analysis of android ssl (in)security. In Proceedings of ACM CCS, 2012.
-
(2012)
Proceedings of ACM CCS
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
16
-
-
84869429339
-
The most dangerous code in the world: Validating ssl certificates in non-browser software
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The most dangerous code in the world: Validating ssl certificates in non-browser software. In Proceedings of ACM CCS, 2012.
-
(2012)
Proceedings of ACM CCS
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
17
-
-
84875550185
-
Towards accurate accounting of cellular data for tcp retransmission
-
Y. Go, D. F. Kune, S. Woo, K. Park, and Y. Kim. Towards accurate accounting of cellular data for tcp retransmission. In Proceedings of ACM HotMobile, 2013.
-
(2013)
Proceedings of ACM HotMobile
-
-
Go, Y.1
Kune, D.F.2
Woo, S.3
Park, K.4
Kim, Y.5
-
19
-
-
74049147408
-
Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier
-
D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In Proceedings of ACM CCSW, 2009.
-
(2009)
Proceedings of ACM CCSW
-
-
Herrmann, D.1
Wendolsky, R.2
Federrath, H.3
-
20
-
-
84878656775
-
Privacy and online social networks: Can colorless green ideas sleep furiously?
-
B. Krishnamurthy. Privacy and online social networks: Can colorless green ideas sleep furiously? IEEE Security and Privacy, 2013.
-
(2013)
IEEE Security and Privacy
-
-
Krishnamurthy, B.1
-
22
-
-
84893410867
-
Httpos: Sealing information leaks with browser-side obfuscation of encrypted ows
-
X. Luo, P. Zhou, E. W. W. Chan, W. Lee, R. K. C. Chang, and R. Perdisci. Httpos: Sealing information leaks with browser-side obfuscation of encrypted ows. In Proceedings of NDSS, 2011.
-
(2011)
Proceedings of NDSS
-
-
Luo, X.1
Zhou, P.2
Chan, E.W.W.3
Lee, W.4
Chang, R.K.C.5
Perdisci, R.6
-
26
-
-
0038311863
-
Traffc analysis: Protocols, attacks, design issues, and open problems
-
Springer
-
J.-F. Raymond. Traffc analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies. Springer, 2001.
-
(2001)
Designing Privacy Enhancing Technologies
-
-
Raymond, J.-F.1
-
31
-
-
84903188119
-
Evolution, detection and analysis of malware for smart devices
-
G. Suarez-Tangil, J. E. Tapiador, P. Peris, and A. Ribagorda. Evolution, detection and analysis of malware for smart devices. IEEE Communications Surveys & Tutorials, 2013.
-
(2013)
IEEE Communications Surveys & Tutorials
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris, P.3
Ribagorda, A.4
-
32
-
-
84907726670
-
No nat'd user left behind: Fingerprinting users behind nat from netow records alone
-
N. V. Verde, G. Ateniese, E. Gabrielli, L. V. Mancini, and A. Spognardi. No nat'd user left behind: Fingerprinting users behind nat from netow records alone. In Proceedings of IEEE ICDCS, 2014.
-
(2014)
Proceedings of IEEE ICDCS
-
-
Verde, N.V.1
Ateniese, G.2
Gabrielli, E.3
Mancini, L.V.4
Spognardi, A.5
-
34
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In Proceedings of IEEE S&P, 2008.
-
(2008)
Proceedings of IEEE S&P
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
35
-
-
74049138076
-
Traffc morphing: An efficient defense against statistical traffic analysis
-
C. V. Wright, S. E. Coull, and F. Monrose. Traffc morphing: An efficient defense against statistical traffic analysis. In Proceedings of NDSS, 2009.
-
(2009)
Proceedings of NDSS
-
-
Wright, C.V.1
Coull, S.E.2
Monrose, F.3
-
36
-
-
84903980304
-
Moses: Supporting and enforcing security profiles on smartphones
-
Y. Zhauniarovich, G. Russello, M. Conti, B. Crispo, and E. Fernandes. Moses: Supporting and enforcing security profiles on smartphones. Dependable and Secure Computing, IEEE Transactions on, 2014.
-
(2014)
Dependable and Secure Computing IEEE Transactions on
-
-
Zhauniarovich, Y.1
Russello, G.2
Conti, M.3
Crispo, B.4
Fernandes, E.5
-
37
-
-
84889000328
-
Identity, location, disease and more: Inferring your secrets from android public resources
-
X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan, X. Wang, C. A. Gunter, and K. Nahrstedt. Identity, location, disease and more: Inferring your secrets from android public resources. In Proceedings of ACM CCS, 2013.
-
(2013)
Proceedings of ACM CCS
-
-
Zhou, X.1
Demetriou, S.2
He, D.3
Naveed, M.4
Pan, X.5
Wang, X.6
Gunter, C.A.7
Nahrstedt, K.8
|