-
5
-
-
84934906443
-
Honeypotlabsac: A virtual honeypot framework for android
-
V. B. Oliveira, Z. Abdelouahab, D. Lopes, M. H. Santos, and V. P. Fernandes, "Honeypotlabsac: a virtual honeypot framework for android", International Journal of Computer Networks & Communications, vol. 5, no. 4, p. 159, 2013.
-
(2013)
International Journal of Computer Networks & Communications
, vol.5
, Issue.4
, pp. 159
-
-
Oliveira, V.B.1
Abdelouahab, Z.2
Lopes, D.3
Santos, M.H.4
Fernandes, V.P.5
-
6
-
-
60049085302
-
Understanding android security
-
W. Enck, M. Ongtang, and P. McDaniel, "Understanding android security", IEEE Security and Privacy, vol. 7, no. 1, pp. 50-57, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
7
-
-
85025700509
-
A study of android application security
-
USENIX Association, August
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of android application security", in Proceedings of the 20th USENIX Security Symposium, USENIX Association, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
8
-
-
77950675112
-
Google android: A comprehensive security assessment
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer, "Google android: a comprehensive security assessment", IEEE Security and Privacy, vol. 8, no. 2, pp. 35-44, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
9
-
-
77950851532
-
Semantically rich application-centric security in android
-
IEEE Computer Society, Los Alamitos, CA, USA, December
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, "Semantically rich application-centric security in android", in Proceedings of the 25th Annual Computer Conference Security Applications (ACSAC'09), pp. 340-349, IEEE Computer Society, Los Alamitos, CA, USA, December 2009.
-
(2009)
Proceedings of the 25th Annual Computer Conference Security Applications (ACSAC'09)
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
10
-
-
84885884531
-
Contextaware usage control for android
-
Springer, Berlin, Germany
-
G. D. Bai, L. Gu, T. Feng, Y. Guo, and X. Q. Chen, "Contextaware usage control for android", in Security and Privacy in Communication Networks, vol. 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 326-343, Springer, Berlin, Germany, 2010.
-
(2010)
Security and Privacy in Communication Networks, Vol. 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, pp. 326-343
-
-
Bai, G.D.1
Gu, L.2
Feng, T.3
Guo, Y.4
Chen, X.Q.5
-
11
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
Chicago, Ill, USA
-
I. Burguera, U. Zurutuza, and S. Nadjm Tehrani, "Crowdroid: behavior-based malware detection system for android", in Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11), Chicago, Ill, USA, 2011.
-
(2011)
Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11)
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm Tehrani, S.3
-
12
-
-
79955570859
-
Taint Droid: An information flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association, Berkeley, Calif, USA
-
W. Enck, P. Gilbert, B.-G. Chun et al., "Taint Droid: an information flow tracking system for realtime privacy monitoring on smartphones", in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10), pp. 1-6, USENIX Association, Berkeley, Calif, USA, 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10)
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
-
13
-
-
78651065389
-
A study on architecture of malicious code blocking scheme with white list in smartphone environment
-
of Communications in Computer and Information Science, Springer, Berlin, Germany
-
K. Lee, R. S. Tolentino, G.-C. Park, and Y.-T. Kim, "A study on architecture of malicious code blocking scheme with white list in smartphone environment", in Communication and Networking, vol. 119 of Communications in Computer and Information Science, pp. 155-163, Springer, Berlin, Germany, 2010.
-
(2010)
Communication and Networking
, vol.119
, pp. 155-163
-
-
Lee, K.1
Tolentino, R.S.2
Park, G.-C.3
Kim, Y.-T.4
-
14
-
-
84860652586
-
-
Tech. Rep., Department of Computer Science, ETH Zurich, Zürich, Switzerland
-
C. Marforio, A. Francillon, and S. Capkun, "Application collusion attack on the permission-based security model and its implications for modern smartphone systems", Tech. Rep., Department of Computer Science, ETH Zurich, Zürich, Switzerland, 2011.
-
(2011)
Application Collusion Attack on the Permission-based Security Model and its Implications for Modern Smartphone Systems
-
-
Marforio, C.1
Francillon, A.2
Capkun, S.3
-
15
-
-
84874555690
-
Smartphone malware detection: From a survey towards taxonomy
-
Fajardo, Puerto Rico, USA, October
-
A. Amamra, C. Talhi, and J. Robert, "Smartphone malware detection: from a survey towards taxonomy", in Proceeding of the 7th International Conference on Malicious and Unwanted Software (Malware'12), pp. 79-86, Fajardo, Puerto Rico, USA, October 2012.
-
(2012)
Proceeding of the 7th International Conference on Malicious and Unwanted Software (Malware'12)
, pp. 79-86
-
-
Amamra, A.1
Talhi, C.2
Robert, J.3
-
16
-
-
84860281488
-
Robotdroid: A lightweightmalware detection framework on smartphones
-
M. Zhao, T. Zhang, F. Ge, and Z. Yuan, "Robotdroid: a lightweightmalware detection framework on smartphones", Journal of Networks, vol. 7, no. 4, pp. 715-722, 2012.
-
(2012)
Journal of Networks
, vol.7
, Issue.4
, pp. 715-722
-
-
Zhao, M.1
Zhang, T.2
Ge, F.3
Yuan, Z.4
-
19
-
-
84934970802
-
Android malware. A study of known and potential malware threats
-
T. Vennon, "Android malware. A study of known and potential malware threats", SMobile Global Threat Centre, 2010.
-
(2010)
SMobile Global Threat Centre
-
-
Vennon, T.1
-
21
-
-
84934931408
-
Analysis of signature-based and behavior-based anti-malware approaches
-
A. Mujumdar, G. Masiwal, and B. B. Meshram, "Analysis of signature-based and behavior-based anti-malware approaches", International Journal of Advanced Research in Computer Engineering and Technology, vol. 2, no. 6, pp. 2037-2039, 2013.
-
(2013)
International Journal of Advanced Research in Computer Engineering and Technology
, vol.2
, Issue.6
, pp. 2037-2039
-
-
Mujumdar, A.1
Masiwal, G.2
Meshram, B.B.3
-
22
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
J. Borello and L. Mé, "Code obfuscation techniques for metamorphic viruses", Journal in Computer Virology, vol. 4, no. 3, pp. 211-220, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 211-220
-
-
Borello, J.1
Mé, L.2
|