-
1
-
-
84945177558
-
-
comScore
-
comScore, "The U.S. Mobile App Report," http://www.comscore.com/I nsights/Presentations-and-Whitepapers/2014/The-US-Mobile-App-Rep ort, 2014.
-
(2014)
The U.S. Mobile App Report
-
-
-
2
-
-
84945189184
-
-
ESET
-
ESET, "Trends for 2013," http://www.eset.com/us/resources/white-pap ers/Trends for 2013 preview.pdf.
-
Trends for 2013
-
-
-
4
-
-
84875912966
-
Touchjacking attacks on web in android, ios, and windows phone
-
Berlin, Heidelberg: Springer-Verlag
-
T. Luo, X. Jin, A. Ananthanarayanan, and W. Du, "Touchjacking Attacks on Web in Android, iOS, and Windows Phone," in Proceedings of the 5th International Conference on Foundations and Practice of Security (FPS). Berlin, Heidelberg: Springer-Verlag, 2012, pp. 227-243.
-
(2012)
Proceedings of the 5th International Conference on Foundations and Practice of Security (FPS)
, pp. 227-243
-
-
Luo, T.1
Jin, X.2
Ananthanarayanan, A.3
Du, W.4
-
6
-
-
85047891807
-
Peeking into your app without actually seeing it: UI state inference and novel android attacks
-
Berkeley, CA, USA: USENIX Association
-
Q. A. Chen, Z. Qian, and Z. M. Mao, "Peeking into Your App Without Actually Seeing It: UI State Inference and Novel Android Attacks," in Proceedings of the 23rd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2014, pp. 1037-1052.
-
(2014)
Proceedings of the 23rd USENIX Security Symposium
, pp. 1037-1052
-
-
Chen, Q.A.1
Qian, Z.2
Mao, Z.M.3
-
7
-
-
84945203986
-
-
Bank of America
-
Bank of America, "SiteKey Security," https://www.bankofamerica.co m/privacy/online-mobile-banking-privacy/sitekey.go.
-
SiteKey Security
-
-
-
9
-
-
84945203987
-
-
University of Michigan CSE Technical Report CSE-TR-586-14
-
E. Fernandes, Q. A. Chen, G. Essl, J. A. Halderman, Z. M. Mao, and A. Prakash, "TIVOs: Trusted Visual I/O Paths for Android," University of Michigan CSE Technical Report CSE-TR-586-14, 2014.
-
(2014)
TIVOs: Trusted Visual I/O Paths for Android
-
-
Fernandes, E.1
Chen, Q.A.2
Essl, G.3
Halderman, J.A.4
Mao, Z.M.5
Prakash, A.6
-
10
-
-
84945203988
-
-
TrendLabs December
-
TrendLabs, "Tapjacking: An Untapped Threat in Android," http://blog.trendmicro.com/trendlabs-security-intelligence/tapjacki ng-an-untapped-threat-in-android/, December 2012.
-
(2012)
Tapjacking: An Untapped Threat in Android
-
-
-
11
-
-
84945199379
-
-
TrendLabs November
-
TrendLabs, "Bypassing Android Permissions: What You Need to Know," http://blog.trendmicro.com/trendlabs-security-intelligence/bypa ssing-android-permissions-what-you-need-to-know/, November 2012.
-
(2012)
Bypassing Android Permissions: What You Need to Know
-
-
-
13
-
-
84875649563
-
Juxtapp: A scalable system for detecting code reuse among android applications
-
Berlin, Heidelberg: Springer-Verlag
-
S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song, "Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications," in Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Berlin, Heidelberg: Springer-Verlag, 2012, pp. 62-81.
-
(2012)
Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
, pp. 62-81
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
14
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
New York, NY, USA: ACM
-
W. Zhou, Y Zhou, X. Jiang, and P. Ning, "Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces," in Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY). New York, NY, USA: ACM, 2012, pp. 317-326.
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY)
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
15
-
-
84877990556
-
Applnk: Watermarking android apps for repackaging deterrence
-
New York, NY, USA: ACM
-
W. Zhou, X. Zhang, and X. Jiang, "Applnk: Watermarking Android Apps for Repackaging Deterrence," in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS). New York, NY, USA: ACM, 2013, pp. 1-12.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (Asia CCS)
, pp. 1-12
-
-
Zhou, W.1
Zhang, X.2
Jiang, X.3
-
16
-
-
84877967533
-
TabShots: Client-side detection of tabnabbing attacks
-
New York, NY, USA: ACM
-
P. De Ryck, N. Nikiforakis, L. Desmet, and W. Joosen, "TabShots: Client-side Detection of Tabnabbing Attacks," in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS). New York, NY, USA: ACM, 2013, pp. 447-456.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (Asia CCS)
, pp. 447-456
-
-
De Ryck, P.1
Nikiforakis, N.2
Desmet, L.3
Joosen, W.4
-
17
-
-
84945203989
-
-
Google
-
Google, "Using Immersive Full-Screen Mode," https://developer, android.com/training/system-ui/immersive.html.
-
Using Immersive Full-Screen Mode
-
-
-
18
-
-
84889010243
-
An empirical study of cryptographic misuse in android applications
-
New York, NY, USA: ACM
-
M. Egele, D. Brumley, Y Fratantonio, and C. Kruegel, "An Empirical Study of Cryptographic Misuse in Android Applications," in Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS). New York, NY, USA: ACM, 2013, pp. 73-84.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS)
, pp. 73-84
-
-
Egele, M.1
Brumley, D.2
Fratantonio, Y.3
Kruegel, C.4
-
21
-
-
85019170256
-
WHYPER: Towards automating risk assessment of mobile applications
-
Berkeley, CA, USA: USENIX Association
-
R. Pandita, X. Xiao, W. Yang, W Enck, and T. Xie, "WHYPER: Towards Automating Risk Assessment of Mobile Applications," in Proceedings of the 22nd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2013, pp. 527-542.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium
, pp. 527-542
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
26
-
-
84881218966
-
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
-
May
-
J. Clark and P. van Oorschot, "SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements," in Proceedings of the IEEE Symposium on Security and Privacy (SP), May 2013, pp. 511-525.
-
(2013)
Proceedings of the IEEE Symposium on Security and Privacy (SP)
, pp. 511-525
-
-
Clark, J.1
Van Oorschot, P.2
-
27
-
-
57649217556
-
Crowdsourcing user studies with mechanical turk
-
New York, NY, USA: ACM
-
A. Kittur, E. H. Chi, and B. Suh, "Crowdsourcing User Studies with Mechanical Turk," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2008, pp. 453-456.
-
(2008)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 453-456
-
-
Kittur, A.1
Chi, E.H.2
Suh, B.3
-
28
-
-
85076323421
-
Securing embedded user interfaces: Android and beyond
-
Berkeley, CA, USA: USENIX Association
-
F. Roesner and T. Kohno, "Securing Embedded User Interfaces: Android and Beyond," in Proceedings of the 22nd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2013, pp. 97-112.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium
, pp. 97-112
-
-
Roesner, F.1
Kohno, T.2
-
29
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
New York, NY, USA: ACM
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, "Android Permissions: User Attention, Comprehension, and Behavior," in Proceedings of the Eighth Symposium On Usable Privacy and Security (SOUPS). New York, NY, USA: ACM, 2012, pp. 3:1-3:14.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS)
, pp. 31-314
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
30
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
Berkeley, CA, USA: USENIX Association
-
R. Xu, H. Saïdi, and R. Anderson, "Aurasium: Practical Policy Enforcement for Android Applications," in Proceedings of the 21st USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2012, pp. 27-27.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
, pp. 27-27
-
-
Xu, R.1
Saïdi, H.2
Anderson, R.3
-
31
-
-
85084161317
-
Trusted paths for browsers
-
Berkeley, CA, USA: USENIX Association
-
Z. E. Ye and S. Smith, "Trusted Paths for Browsers," in Proceedings of the 11th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2002, pp. 263-279.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 263-279
-
-
Ye, Z.E.1
Smith, S.2
-
32
-
-
84906774691
-
Neural signatures of user-centered security: An fmri study of phishing and malware warnings
-
A. Neupane, N. Saxena, K. Kuruvilla, M. Georgescu, and R. Kana, "Neural Signatures of User-Centered Security: An fMRI Study of Phishing and Malware Warnings," in Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS), 2014.
-
(2014)
Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS)
-
-
Neupane, A.1
Saxena, N.2
Kuruvilla, K.3
Georgescu, M.4
Kana, R.5
-
33
-
-
85093935513
-
IPhish: Phishing vulnerabilities on consumer electronics
-
Y Niu, F. Hsu, and H. Chen, "iPhish: Phishing Vulnerabilities on Consumer Electronics." in Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC), 2008.
-
(2008)
Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC)
-
-
Niu, Y.1
Hsu, F.2
Chen, H.3
-
34
-
-
84926351578
-
Crying Wolf: An empirical study of SSL warning effectiveness
-
Berkeley, CA, USA: USENIX Association
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor, "Crying Wolf: An Empirical Study of SSL Warning Effectiveness," in Proceedings of the 18th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2009, pp. 399-416.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 399-416
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
35
-
-
84922843277
-
The effectiveness of security images in internet banking
-
Jan
-
J. Lee, L. Bauer, and M. L. Mazurek, "The Effectiveness of Security Images in Internet Banking," Internet Computing, IEEE, vol. 19, no. 1, pp. 54-62, Jan 2015.
-
(2015)
Internet Computing, IEEE
, vol.19
, Issue.1
, pp. 54-62
-
-
Lee, J.1
Bauer, L.2
Mazurek, M.L.3
-
36
-
-
84869487159
-
Why Eve and Mallory love android: An analysis of android SSL (in)security
-
New York, NY, USA: ACM
-
S. Fahl, M. Harbach, T. Muders, L. Baumgärtner, B. Freisleben, and M. Smith, "Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security," in Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS). New York, NY, USA: ACM, 2012, pp. 50-61.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS)
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
37
-
-
34548786769
-
The emperor's new security indicators
-
May
-
S. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "The Emperor's New Security Indicators," in Proceedings of the IEEE Symposium on Security and Privacy (SP), May 2007, pp. 51-65.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy (SP)
, pp. 51-65
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
38
-
-
85002862540
-
Alice in warningland: A large-scale field study of browser security warning effectiveness
-
Berkeley, CA, USA: USENIX Association
-
D. Akhawe and A. P. Felt, "Alice in Warningland: A Large-scale Field Study of Browser Security Warning Effectiveness," in Proceedings of the 22nd USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2013, pp. 257-272.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium
, pp. 257-272
-
-
Akhawe, D.1
Felt, A.P.2
-
39
-
-
85044841595
-
Client-side defense against web-based identity theft
-
N. Chou, R. Ledesma, Y Teraguchi, D. Boneh, and J. C. Mitchell, "Client-side defense against web-based identity theft," in Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS), 2004.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
40
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
New York, NY, USA: ACM
-
R. Dhamija and J. D. Tygar, "The Battle Against Phishing: Dynamic Security Skins," in Proceedings of the Symposium On Usable Privacy and Security (SOUPS). New York, NY, USA: ACM, 2005, pp. 77-88.
-
(2005)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
42
-
-
84945203993
-
-
Google
-
Google, "Safe Browsing," http://www.google.com/transparencyrepor t/safebrowsing/.
-
Safe Browsing
-
-
|