-
1
-
-
84937581619
-
-
Android Developers
-
Android Developers. Common Intents. http://developer:android:com/guide/components/intents-common:html.
-
Common Intents
-
-
-
2
-
-
84937547947
-
-
Android Developers
-
Android Developers. Intent. http://developer:android:com/reference/android/content/Intent:html.
-
Intent
-
-
-
3
-
-
84874794209
-
-
Android Developers
-
Android Developers. Platform versions. https://developer:android:com/about/dashboards/index:html#Platform.
-
Platform Versions
-
-
-
4
-
-
84937542451
-
-
Android Developers
-
Android Developers. RecognizerIntent. http://developer:android:com/reference/android/speech/RecognizerIntent:html.
-
RecognizerIntent
-
-
-
5
-
-
84889680274
-
-
Android Developers
-
Android Developers. Text To Speech. http://developer:android:com/reference/android/speech/tts/TextToSpeech:html.
-
Text to Speech
-
-
-
6
-
-
84937581620
-
-
AOSP. Headset State Machine. https://android:googlesource:com/platform/packages/apps/Bluetooth/.
-
Headset State Machine
-
-
AOSP1
-
7
-
-
84937543966
-
-
AOSP. Telephony. https://android:googlesource:com/platform/packages/services/Telephony/.
-
Telephony
-
-
AOSP1
-
8
-
-
84926378499
-
-
Apple. Siri. http://www:apple:com/ios/siri/.
-
Apple. Siri
-
-
-
9
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: Analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 217-228. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
10
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
ACM
-
A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith. Practicality of accelerometer side channels on smartphones. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 41-50. ACM, 2012.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
12
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In 19th Annual Network & Distributed System Security Symposium (NDSS), volume 17, pages 18-25, 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium (NDSS)
, vol.17
, pp. 18-25
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
15
-
-
79961035117
-
Analyzing inter-application communication in android
-
ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, pages 239-252. ACM, 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
17
-
-
84874114744
-
-
CyanogenMod
-
CyanogenMod. Google Apps. http://wiki:cyanogenmod:org/w/Google-Apps.
-
Google Apps
-
-
-
19
-
-
85037073388
-
Privilege escalation attacks on android
-
Springer
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy. Privilege escalation attacks on android. In Information Security, pages 346-360. Springer, 2011.
-
(2011)
Information Security
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
20
-
-
85005943103
-
Accelprint: Imperfections of accelerometers make smartphones trackable
-
S. Dey, N. Roy, W. Xu, R. R. Choudhury, and S. Nelakuditi. Accelprint: Imperfections of accelerometers make smartphones trackable. In Proceedings of the 21st Annual Network and Distributed System Security Symposium, NDSS, 2014.
-
(2014)
Proceedings of the 21st Annual Network and Distributed System Security Symposium, NDSS
-
-
Dey, S.1
Roy, N.2
Xu, W.3
Choudhury, R.R.4
Nelakuditi, S.5
-
21
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, volume 10, pages 1-6, 2010.
-
(2010)
OSDI
, vol.10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
22
-
-
80755187788
-
Android permissions demystified
-
ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, pages 627-638. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
23
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
ACM
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security, page 3. ACM, 2012.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
24
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
25
-
-
0036786402
-
Multi-sensor context-awareness in mobile devices and smart artifacts
-
H. W. Gellersen, A. Schmidt, and M. Beigl. Multi-sensor context-awareness in mobile devices and smart artifacts. Mobile Networks and Applications, 7(5):341-351, 2002.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.5
, pp. 341-351
-
-
Gellersen, H.W.1
Schmidt, A.2
Beigl, M.3
-
26
-
-
84937577185
-
-
Google
-
Google. Google Apps for Android. https://www:google:com/mobile/android/.
-
Google Apps for Android
-
-
-
27
-
-
84937581622
-
-
Google
-
Google. Use your voice on Android. https://support:google:com/websearch/answer/2940021?hl=en&ref-topic=4409793.
-
Use your Voice on Android
-
-
-
30
-
-
84877985630
-
Sensing-enabled channels for hard-to-detect command and control of mobile devices
-
ACM
-
R. Hasan, N. Saxena, T. Haleviz, S. Zawoad, and D. Rinehart. Sensing-enabled channels for hard-to-detect command and control of mobile devices. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 469-480. ACM, 2013.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 469-480
-
-
Hasan, R.1
Saxena, N.2
Haleviz, T.3
Zawoad, S.4
Rinehart, D.5
-
32
-
-
84937581623
-
Worldwide smartphone shipments edge past 300 million units in the second quarter
-
according to IDC., August
-
IDC. Worldwide smartphone shipments edge past 300 million units in the second quarter; android and ios devices account for 96% of the global market, according to IDC. http://www:idc:com/getdoc:jsp?containerId=prUS25037214, August, 2014.
-
(2014)
Android and Ios Devices Account for 96% of the Global Market
-
-
IDC1
-
33
-
-
84869786248
-
Reducing attack surfaces for intra-application communication in android
-
ACM
-
D. Kantola, E. Chin, W. He, and D. Wagner. Reducing attack surfaces for intra-application communication in android. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, pages 69-80. ACM, 2012.
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 69-80
-
-
Kantola, D.1
Chin, E.2
He, W.3
Wagner, D.4
-
34
-
-
84959317411
-
-
Kaspersky Lab., December 2013
-
Kaspersky Lab. Kaspersky security bulletin 2013. http://media:kaspersky:com/pdf/KSB-2013-EN:pdf December 2013.
-
(2013)
Kaspersky Security Bulletin
-
-
-
35
-
-
85037974473
-
Activity recognition using hierarchical hidden markov models on a smartphone with 3d accelerometer
-
Springer
-
Y.-S. Lee and S.-B. Cho. Activity recognition using hierarchical hidden markov models on a smartphone with 3d accelerometer. In Hybrid Artificial Intelligent Systems, pages 460-467. Springer, 2011.
-
(2011)
Hybrid Artificial Intelligent Systems
, pp. 460-467
-
-
Lee, Y.-S.1
Cho, S.-B.2
-
36
-
-
84937581624
-
-
Microsoft
-
Microsoft. Cortana. http://www:windowsphone:com/en-us/features#Cortana.
-
Cortana
-
-
-
37
-
-
84937576314
-
-
Motorola
-
Motorola. How do I setup and use touchless control? https://motorola-global-portal:custhelp:com/app/answers/prod-answer-detail/a-id/94881/p/30;6720;8696/action/auth.
-
How do I Setup and Use Touchless Control?
-
-
-
38
-
-
84937581625
-
-
Motorola
-
Motorola. Touchless Control. http://www:motorola:com/us/Moto-XFeatures-Touchless-Control/motoxfeatures-2-touchless:html.
-
Touchless Control
-
-
-
39
-
-
33847269609
-
Environmental noise, sleep and health
-
A. Muzet. Environmental noise, sleep and health. Sleep medicine reviews, 11(2):135-142, 2007.
-
(2007)
Sleep Medicine Reviews
, vol.11
, Issue.2
, pp. 135-142
-
-
Muzet, A.1
-
40
-
-
84860294696
-
Accessory: Password inference using accelerometers on smartphones
-
ACM
-
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012.
-
(2012)
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
41
-
-
84900868414
-
-
Ponemon Institute. March
-
Ponemon Institute. Smartphone security survey of U.S. consumers. http://aa-download:avg:com/filedir/other/Smartphone:pdf March, 2011.
-
(2011)
Smartphone Security Survey of U.S. Consumers
-
-
-
44
-
-
84937547562
-
-
Samsung
-
Samsung. S Voice. http://www:samsung:com/global/galaxys3/svoice:html.
-
S Voice
-
-
-
45
-
-
84885728886
-
Your word is my command": Google search by voice: A case study
-
Springer
-
J. Schalkwyk, D. Beeferman, F. Beaufays, B. Byrne, C. Chelba, M. Cohen, M. Kamvar, and B. Strope. "Your word is my command": Google search by voice: A case study. In Advances in Speech Recognition, pages 61-90. Springer, 2010.
-
(2010)
Advances in Speech Recognition
, pp. 61-90
-
-
Schalkwyk, J.1
Beeferman, D.2
Beaufays, F.3
Byrne, B.4
Chelba, C.5
Cohen, M.6
Kamvar, M.7
Strope, B.8
-
46
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proceedings of the 18st Annual Network and Distributed System Security Symposium, NDSS, 2011.
-
(2011)
Proceedings of the 18st Annual Network and Distributed System Security Symposium, NDSS
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
49
-
-
85180406770
-
PlaceRaider: Virtual theft in physical spaces with smartphones
-
R. Templeman, Z. Rahman, D. Crandall, and A. Kapadia. PlaceRaider: Virtual theft in physical spaces with smartphones. In Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS, 2013.
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS
-
-
Templeman, R.1
Rahman, Z.2
Crandall, D.3
Kapadia, A.4
-
50
-
-
84937581628
-
-
VB-Audio Software
-
VB-Audio Software. VB-Audio Virtual Cable. http://vb-audio:pagesperso-orange:fr/Cable/.
-
VB-Audio Virtual Cable
-
-
-
51
-
-
84937553686
-
-
Wikipedia
-
Wikipedia. Sound pressure. http://en:wikipedia:org/wiki/Sound-pressure.
-
Sound Pressure
-
-
-
52
-
-
84889012971
-
The impact of vendor customizations on android security
-
ACM
-
L. Wu, M. Grace, Y. Zhou, C. Wu, and X. Jiang. The impact of vendor customizations on android security. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 623-634. ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 623-634
-
-
Wu, L.1
Grace, M.2
Zhou, Y.3
Wu, C.4
Jiang, X.5
-
53
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX Security Symposium, 2012.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
-
-
Yan, L.K.1
Yin, H.2
-
54
-
-
84914115732
-
The peril of fragmentation: Security hazards in android device driver customizations
-
2014 IEEE Symposium on. IEEE
-
X. Zhou, Y. Lee, N. Zhang, M. Naveed, and X. Wang. The peril of fragmentation: Security hazards in android device driver customizations. In Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 2014.
-
(2014)
Security and Privacy (SP)
-
-
Zhou, X.1
Lee, Y.2
Zhang, N.3
Naveed, M.4
Wang, X.5
-
55
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
2012 IEEE Symposium on, IEEE
-
Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 95-109. IEEE, 2012.
-
(2012)
Security and Privacy (SP)
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
56
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, pages 5-8, 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium
, pp. 5-8
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|