-
1
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
New York, NY, USA: ACM
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, "Unsafe exposure analysis of mobile in-app advertisements," in Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WISEC '12. New York, NY, USA: ACM, 2012, pp. 101-112.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Ser. WISEC '12
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
2
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA: USENIX Association
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of android application security," in Proceedings of the 20th USENIX Conference on Security, ser. SEC'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 21-21.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, Ser. SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
3
-
-
84889041424
-
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
-
New York, NY, USA: ACM
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang, "Appintent: analyzing sensitive data transmission in android for privacy leakage detection," in Proceedings of the 2013 ACM Conference on Computer and Communications Security, ser. CCS '13. New York, NY, USA: ACM, 2013, pp. 1043-1054.
-
(2013)
Proceedings of the 2013 ACM Conference on Computer and Communications Security, Ser. CCS '13
, pp. 1043-1054
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
4
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
New York, NY, USA: ACM
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel, "Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps," in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, ser. PLDI '14. New York, NY, USA: ACM, 2013, pp. 259-269.
-
(2013)
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Ser. PLDI '14
, pp. 259-269
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
5
-
-
84888331381
-
Pios: Detecting privacy leaks in ios applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, "Pios: Detecting privacy leaks in ios applications," in Proceedings of the 18th Network and Distributed System Security, ser. NDSS '11, 2011.
-
(2011)
Proceedings of the 18th Network and Distributed System Security, Ser. NDSS '11
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
7
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
New York, NY, USA: ACM
-
Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang, "Vetting undesirable behaviors in android apps with permission use analysis," in Proceedings of the 2013 ACM Conference on Computer and Communications Security, ser. CCS '13. New York, NY, USA: ACM, 2013, pp. 611-622.
-
(2013)
Proceedings of the 2013 ACM Conference on Computer and Communications Security, Ser. CCS '13
, pp. 611-622
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
Gu, G.5
Ning, P.6
Wang, X.S.7
Zang, B.8
-
8
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smart-phones
-
Berkeley, CA, USA: USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-Daniel, and A. N. Sheth, "Taintdroid: an information-flow tracking system for realtime privacy monitoring on smart-phones," in Proceedings of the 9th USENIX Conference on Operating systems Design and Implementation, ser. OSDI'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-6.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, Ser. OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mc-Daniel, P.6
Sheth, A.N.7
-
9
-
-
84879723448
-
Application-only call graph construction
-
Berlin, Heidelberg: Springer-Verlag
-
K. Ali and O. Lhoták, "Application-only call graph construction," in Proceedings of the 26th European Conference on Object-Oriented Programming, ser. ECOOP'12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 688-712.
-
(2012)
Proceedings of the 26th European Conference on Object-Oriented Programming, Ser. ECOOP'12
, pp. 688-712
-
-
Ali, K.1
Lhoták, O.2
-
10
-
-
84945230671
-
-
Android callbacks (flowdroid project)
-
"Android callbacks (flowdroid project)," https://github.com/secure-software-engineering/soot-infoflow-android/blob/develop/AndroidCallbacks.txt.
-
-
-
-
11
-
-
58449129985
-
Bitblaze: A new approach to computer security via binary analysis
-
Berlin, Heidelberg: Springer-Verlag
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena, "Bitblaze: A new approach to computer security via binary analysis," in Proceedings of the 4th International Conference on Information Systems Security, ser. ICISS '08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 1-25.
-
(2008)
Proceedings of the 4th International Conference on Information Systems Security, Ser. ICISS '08
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
12
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
Washington, DC, USA: IEEE Computer Society
-
E. J. Schwartz, T. Avgerinos, and D. Brumley, "All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)," in Proceedings of the 2010 IEEE Symposium on Security and Privacy, ser. SP '10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 317-331.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, Ser. SP '10
, pp. 317-331
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
13
-
-
84887633886
-
On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices
-
July
-
G. Sarwar, O. Mehani, R. Boreli, and D. Kaafar, "On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices," in Proceedings of the 10th International Conference on Security and Cryptography, July 2013, pp. 461-467.
-
(2013)
Proceedings of the 10th International Conference on Security and Cryptography
, pp. 461-467
-
-
Sarwar, G.1
Mehani, O.2
Boreli, R.3
Kaafar, D.4
-
14
-
-
84945230672
-
-
Scrubdroid/antitaintdroid project
-
"Scrubdroid/antitaintdroid project," http://gsbabil.github.io/AntiTaintDroid/.
-
-
-
-
15
-
-
84945230673
-
-
dex2jar: Tools to work with android.dex and Java.class files
-
"dex2jar: Tools to work with android.dex and java.class files," https://code.google.com/p/dex2jar/.
-
-
-
-
16
-
-
84945230674
-
-
Xml apk parser
-
"Xml apk parser," https://code.google.com/p/xml-apk-parser/.
-
-
-
-
17
-
-
84945230675
-
-
Android dynamic Java virtual machine: Bytecode instruction set
-
"Android dynamic java virtual machine: Bytecode instruction set," https://source.android.com/devices/tech/dalvik/dalvik-bytecode.html.
-
-
-
-
18
-
-
84945230676
-
-
Droidbench, an open test suite for evaluating the effectiveness of taint-analysis
-
"Droidbench, an open test suite for evaluating the effectiveness of taint-analysis," https://github.com/secure-software-engineering/DroidBench.
-
-
-
-
19
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Washington, DC, USA: IEEE Computer Society
-
Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 95-109. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.16
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, Ser. SP '12
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
20
-
-
84945230677
-
-
Lookout mobile security
-
"Lookout mobile security," https://www.lookout.com/.
-
-
-
-
21
-
-
84945230678
-
-
Avg mobile security
-
"Avg mobile security," http://www.avgmobilation.com/.
-
-
-
-
22
-
-
84945230679
-
-
Sophos security
-
"Sophos security," http://www.sophos.com/en-us.aspx.
-
-
-
-
23
-
-
84945230680
-
-
Nviso apkscan
-
"Nviso apkscan," http://apkscan.nviso.be/.
-
-
-
-
24
-
-
84945230681
-
-
Semantec mobile security
-
"Semantec mobile security," http://www.symantec.com/mobile-security.
-
-
-
-
25
-
-
84945230682
-
-
Fortiguard virus encyclopedia
-
"Fortiguard virus encyclopedia," http://www.fortiguard.com/encyclopedia/.
-
-
-
-
26
-
-
84945230683
-
-
Trendlabs security intelligence blog
-
"Trendlabs security intelligence blog," http://blog.trendmicro. com/trendlabs-security-intelligence/.
-
-
-
-
27
-
-
84945230684
-
-
An evaluation of the application verification service in android 4.2
-
"An evaluation of the application verification service in android 4.2," http://www.cs.ncsu.edu/faculty/jiang/appverify/.
-
-
-
-
28
-
-
84945230685
-
-
Virustotal: Free online virus, malware and url scanner
-
"Virustotal: Free online virus, malware and url scanner," https://www.virustotal.com/.
-
-
-
-
31
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA: ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 627-638.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, Ser. CCS '11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
32
-
-
84945230687
-
-
Free apps used to spy on millions of phones: Flashlight program can be used to secretly record location of phone and content of text messages
-
"Free apps used to spy on millions of phones: Flashlight program can be used to secretly record location of phone and content of text messages," http://www.dailymail.co.uk/news/article-2808007/Free-apps-used-spy-millions-phones-Flashlight-program-used-secretly-record-location-phone-content-text-messages.html.
-
-
-
-
33
-
-
84871959049
-
Ad-droid: Privilege separation for applications and advertisers in android
-
New York, NY, USA: ACM
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner, "Ad-droid: Privilege separation for applications and advertisers in android," in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '12. New York, NY, USA: ACM, 2012, pp. 71-72.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Ser. ASIACCS '12
, pp. 71-72
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
34
-
-
85076688797
-
πbox: A platform for privacy-preserving apps
-
S. Lee, E. L. Wong, D. Goel, M. Dahlin, and V. Shmatikov, "πbox: A platform for privacy-preserving apps," in Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, ser. NSDI '13, 2013, pp. 501-514.
-
(2013)
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, Ser. NSDI '13
, pp. 501-514
-
-
Lee, S.1
Wong, E.L.2
Goel, D.3
Dahlin, M.4
Shmatikov, V.5
-
35
-
-
84893257561
-
Aframe: Isolating advertisements from mobile applications in android
-
New York, NY, USA: ACM
-
X. Zhang, A. Ahlawat, and W. Du, "Aframe: Isolating advertisements from mobile applications in android," in Proceedings of the 29th Annual Computer Security Applications Conference, ser. ACSAC '13. New York, NY, USA: ACM, 2013, pp. 9-18.
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference, Ser. ACSAC '13
, pp. 9-18
-
-
Zhang, X.1
Ahlawat, A.2
Du, W.3
-
36
-
-
84893232129
-
Firedroid: Hardening security in almost-stock android
-
New York, NY, USA: ACM
-
G. Russello, A. B. Jimenez, H. Naderi, and W. van der Mark, "Firedroid: Hardening security in almost-stock android," in Proceedings of the 29th Annual Computer Security Applications Conference, ser. ACSAC '13. New York, NY, USA: ACM, 2013, pp. 319-328.
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference, Ser. ACSAC '13
, pp. 319-328
-
-
Russello, G.1
Jimenez, A.B.2
Naderi, H.3
Mark Der W.Van4
-
37
-
-
84868249595
-
Privacy-preserving applications on smartphones
-
Berkeley, CA, USA: USENIX Association
-
Y. Huang, P. Chapman, and D. Evans, "Privacy-preserving applications on smartphones," in Proceedings of the 6th USENIX Conference on Hot Topics in Security, ser. Hot-Sec'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 4-4.
-
(2011)
Proceedings of the 6th USENIX Conference on Hot Topics in Security, Ser. Hot-Sec'11
, pp. 4-4
-
-
Huang, Y.1
Chapman, P.2
Evans, D.3
-
38
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
Berkeley, CA, USA: USENIX Association
-
R. Xu, H. Säidi, and R. Anderson, "Aurasium: Practical policy enforcement for android applications," in Proceedings of the 21st USENIX Conference on Security Symposium, ser. SEC'12. Berkeley, CA, USA: USENIX Association, 2012, pp. 27-27.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Ser. SEC'12
, pp. 27-27
-
-
Xu, R.1
Säidi, H.2
Anderson, R.3
-
39
-
-
85047891952
-
Flexible and finegrained mandatory access control on android for diverse security and privacy policies
-
Berkeley, CA, USA: USENIX Association
-
S. Bugiel, S. Heuser, and A.-R. Sadeghi, "Flexible and finegrained mandatory access control on android for diverse security and privacy policies," in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC'13. Berkeley, CA, USA: USENIX Association, 2013, pp. 131-146.
-
(2013)
Proceedings of the 22Nd USENIX Conference on Security, Ser. SEC'13
, pp. 131-146
-
-
Bugiel, S.1
Heuser, S.2
Sadeghi, A.-R.3
-
40
-
-
1542595877
-
Static and dynamic analysis: Synergy and du-ality
-
Portland, OR, May 9, 2003
-
M. D. Ernst, "Static and dynamic analysis: Synergy and du-ality," in WODA 2003: ICSE Workshop on Dynamic Analysis, Portland, OR, May 9, 2003, pp. 24-27.
-
WODA 2003: ICSE Workshop on Dynamic Analysis
, pp. 24-27
-
-
Ernst, M.D.1
-
41
-
-
84865041878
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets," in Proceedings of the 19th Network and Distributed System Security, ser. NDSS '12, 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security, Ser. NDSS '12
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
42
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA: ACM
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification," in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 235-245.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, Ser. CCS '09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
43
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
New York, NY, USA: ACM
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "Riskranker: scalable and accurate zero-day android malware detection," in Proceedings of the 10th International Conference on Mobile systems, Applications, and Services, ser. MobiSys '12. New York, NY, USA: ACM, 2012, pp. 281-294.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Ser. MobiSys '12
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
44
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
New York, NY, USA: ACM
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, "These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications," in Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 639-652.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, Ser. CCS '11
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
45
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
Jun.
-
W. R. Bush, J. D. Pincus, and D. J. Sielaff, "A static analyzer for finding dynamic programming errors," Softw. Pract. Exper., vol. 30, no. 7, pp. 775-802, Jun. 2000.
-
(2000)
Softw. Pract. Exper.
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.R.1
Pincus, J.D.2
Sielaff, D.J.3
-
46
-
-
80053121582
-
Directed symbolic execution
-
Berlin, Heidelberg: Springer-Verlag
-
K.-K. Ma, K. Y. Phang, J. S. Foster, and M. Hicks, "Directed symbolic execution," in Proceedings of the 18th International Conference on Static Analysis, ser. SAS'11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 95-111.
-
(2011)
Proceedings of the 18th International Conference on Static Analysis, Ser. SAS'11
, pp. 95-111
-
-
Ma, K.-K.1
Phang, K.Y.2
Foster, J.S.3
Hicks, M.4
-
47
-
-
78650114632
-
Alias analysis for optimization of dynamic languages
-
New York, NY, USA: ACM
-
M. Gorbovitski, Y. A. Liu, S. D. Stoller, T. Rothamel, and T. K. Tekle, "Alias analysis for optimization of dynamic languages," in Proceedings of the 6th Symposium on Dynamic Languages, ser. DLS '10. New York, NY, USA: ACM, 2010, pp. 27-42.
-
(2010)
Proceedings of the 6th Symposium on Dynamic Languages, Ser. DLS '10
, pp. 27-42
-
-
Gorbovitski, M.1
Liu, Y.A.2
Stoller, S.D.3
Rothamel, T.4
Tekle, T.K.5
|