메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 931-948

What the app is that? Deception and countermeasures in the android user interface

Author keywords

mobile security; static analysis; usable security

Indexed keywords

ANDROID (OPERATING SYSTEM); GRAPHICAL USER INTERFACES; NETWORK SECURITY; STATIC ANALYSIS;

EID: 84945177387     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.62     Document Type: Conference Paper
Times cited : (131)

References (44)
  • 1
    • 84945177558 scopus 로고    scopus 로고
    • comScore
    • comScore, "The U.S. Mobile App Report," http://www.comscore.com/I nsights/Presentations-and-Whitepapers/2014/The-US-Mobile-App-Rep ort, 2014.
    • (2014) The U.S. Mobile App Report
  • 2
    • 84945189184 scopus 로고    scopus 로고
    • ESET
    • ESET, "Trends for 2013," http://www.eset.com/us/resources/white-pap ers/Trends for 2013 preview.pdf.
    • Trends for 2013
  • 6
    • 85047891807 scopus 로고    scopus 로고
    • Peeking into your app without actually seeing it: UI state inference and novel android attacks
    • Berkeley, CA, USA: USENIX Association
    • Q. A. Chen, Z. Qian, and Z. M. Mao, "Peeking into Your App Without Actually Seeing It: UI State Inference and Novel Android Attacks," in Proceedings of the 23rd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2014, pp. 1037-1052.
    • (2014) Proceedings of the 23rd USENIX Security Symposium , pp. 1037-1052
    • Chen, Q.A.1    Qian, Z.2    Mao, Z.M.3
  • 7
    • 84945203986 scopus 로고    scopus 로고
    • Bank of America
    • Bank of America, "SiteKey Security," https://www.bankofamerica.co m/privacy/online-mobile-banking-privacy/sitekey.go.
    • SiteKey Security
  • 10
    • 84945203988 scopus 로고    scopus 로고
    • TrendLabs December
    • TrendLabs, "Tapjacking: An Untapped Threat in Android," http://blog.trendmicro.com/trendlabs-security-intelligence/tapjacki ng-an-untapped-threat-in-android/, December 2012.
    • (2012) Tapjacking: An Untapped Threat in Android
  • 11
    • 84945199379 scopus 로고    scopus 로고
    • TrendLabs November
    • TrendLabs, "Bypassing Android Permissions: What You Need to Know," http://blog.trendmicro.com/trendlabs-security-intelligence/bypa ssing-android-permissions-what-you-need-to-know/, November 2012.
    • (2012) Bypassing Android Permissions: What You Need to Know
  • 17
  • 21
    • 85019170256 scopus 로고    scopus 로고
    • WHYPER: Towards automating risk assessment of mobile applications
    • Berkeley, CA, USA: USENIX Association
    • R. Pandita, X. Xiao, W. Yang, W Enck, and T. Xie, "WHYPER: Towards Automating Risk Assessment of Mobile Applications," in Proceedings of the 22nd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2013, pp. 527-542.
    • (2013) Proceedings of the 22nd USENIX Security Symposium , pp. 527-542
    • Pandita, R.1    Xiao, X.2    Yang, W.3    Enck, W.4    Xie, T.5
  • 26
    • 84881218966 scopus 로고    scopus 로고
    • SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
    • May
    • J. Clark and P. van Oorschot, "SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements," in Proceedings of the IEEE Symposium on Security and Privacy (SP), May 2013, pp. 511-525.
    • (2013) Proceedings of the IEEE Symposium on Security and Privacy (SP) , pp. 511-525
    • Clark, J.1    Van Oorschot, P.2
  • 28
    • 85076323421 scopus 로고    scopus 로고
    • Securing embedded user interfaces: Android and beyond
    • Berkeley, CA, USA: USENIX Association
    • F. Roesner and T. Kohno, "Securing Embedded User Interfaces: Android and Beyond," in Proceedings of the 22nd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2013, pp. 97-112.
    • (2013) Proceedings of the 22nd USENIX Security Symposium , pp. 97-112
    • Roesner, F.1    Kohno, T.2
  • 30
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: Practical policy enforcement for android applications
    • Berkeley, CA, USA: USENIX Association
    • R. Xu, H. Saïdi, and R. Anderson, "Aurasium: Practical Policy Enforcement for Android Applications," in Proceedings of the 21st USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2012, pp. 27-27.
    • (2012) Proceedings of the 21st USENIX Security Symposium , pp. 27-27
    • Xu, R.1    Saïdi, H.2    Anderson, R.3
  • 35
    • 84922843277 scopus 로고    scopus 로고
    • The effectiveness of security images in internet banking
    • Jan
    • J. Lee, L. Bauer, and M. L. Mazurek, "The Effectiveness of Security Images in Internet Banking," Internet Computing, IEEE, vol. 19, no. 1, pp. 54-62, Jan 2015.
    • (2015) Internet Computing, IEEE , vol.19 , Issue.1 , pp. 54-62
    • Lee, J.1    Bauer, L.2    Mazurek, M.L.3
  • 38
    • 85002862540 scopus 로고    scopus 로고
    • Alice in warningland: A large-scale field study of browser security warning effectiveness
    • Berkeley, CA, USA: USENIX Association
    • D. Akhawe and A. P. Felt, "Alice in Warningland: A Large-scale Field Study of Browser Security Warning Effectiveness," in Proceedings of the 22nd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2013, pp. 257-272.
    • (2013) Proceedings of the 22nd USENIX Security Symposium , pp. 257-272
    • Akhawe, D.1    Felt, A.P.2
  • 42
    • 84945203993 scopus 로고    scopus 로고
    • Google
    • Google, "Safe Browsing," http://www.google.com/transparencyrepor t/safebrowsing/.
    • Safe Browsing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.