-
1
-
-
85180404268
-
-
Admob. http://www.admob.com.
-
Admob
-
-
-
3
-
-
85180408055
-
-
June
-
Android/DroidKungFu.A!tr. http://www.fortiguard.com/encyclopedia/virus/android_droidkungfu.a!tr.html, June 2011.
-
(2011)
Android/DroidKungFu.A!tr
-
-
-
4
-
-
85180414299
-
-
Dec
-
Android/FakeDoc.A!tr. http://www.fortiguard.com/av/VID3304615, Dec. 2011.
-
(2011)
Android/FakeDoc.A!tr
-
-
-
5
-
-
85180417931
-
-
Jan
-
Android/Steek.A!tr. http://www.fortiguard.com/av/VID3458224, Jan. 2012.
-
(2012)
Android/Steek.A!tr
-
-
-
7
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a dynamic reputation system for DNS. In Proceedings of the 19th USENIX Security Symposium, 2010.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
8
-
-
85068675731
-
Detecting malware domains at the upper DNS hierarchy
-
M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon. Detecting malware domains at the upper DNS hierarchy. In Proceedings of the 20th USENIX Security Symposium, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou, N.4
Dagon, D.5
-
12
-
-
79961035117
-
Analyzing inter-application communication in Android
-
E. Chin, A. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In Proceedings of International Conference on Mobile Systems, Applications, and Services, 2011.
-
(2011)
Proceedings of International Conference on Mobile Systems, Applications, and Services
-
-
Chin, E.1
Felt, A.2
Greenwood, K.3
Wagner, D.4
-
13
-
-
70349289360
-
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
-
D. Dagon, M. Antonakakis, P. Vixie, T. Jinmei, and W. Lee. Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. In Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
-
-
Dagon, D.1
Antonakakis, M.2
Vixie, P.3
Jinmei, T.4
Lee, W.5
-
14
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010.
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
17
-
-
60049085302
-
Understanding Android security
-
W. Enck, M. Ongtang, and P. McDaniel. Understanding Android security. IEEE Security and Privacy Magazine, 7(1):50-57, 2009.
-
(2009)
IEEE Security and Privacy Magazine
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
18
-
-
82955165682
-
Over the top video: the gorilla in cellular networks
-
page New York, NY, USA, ACM
-
J. Erman, A. Gerber, K. K. Ramadrishnan, S. Sen, and O. Spatscheck. Over the top video: the gorilla in cellular networks. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC'11, page 127136, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC'11
, pp. 127136
-
-
Erman, J.1
Gerber, A.2
Ramadrishnan, K. K.3
Sen, S.4
Spatscheck, O.5
-
19
-
-
78650882260
-
A first look at traffic on smartphones
-
page New York, NY, USA, ACM
-
H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin. A first look at traffic on smartphones. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, IMC'10, page 281287, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, IMC'10
, pp. 281287
-
-
Falaki, H.1
Lymberopoulos, D.2
Mahajan, R.3
Kandula, S.4
Estrin, D.5
-
20
-
-
80755187788
-
Android permissions demystified
-
A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the ACM Conference on Computer and Communication Security, 2011.
-
(2011)
Proceedings of the ACM Conference on Computer and Communication Security
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
21
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, 2011.
-
(2011)
ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
23
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. Felt, H. Wang, A. Moschuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In Proceedings of the 20th USENIX Security Symposium, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Felt, A.1
Wang, H.2
Moschuk, A.3
Hanna, S.4
Chin, E.5
-
24
-
-
79961082334
-
A comparative study of handheld and non-handheld traffic in campus Wi-Fi networks
-
page Berlin, Heidelberg, Springer-Verlag
-
A. Gember, A. Anand, and A. Akella. A comparative study of handheld and non-handheld traffic in campus Wi-Fi networks. In Proceedings of the 12th international conference on Passive and active measurement, PAM'11, page 173183, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 12th international conference on Passive and active measurement, PAM'11
, pp. 173183
-
-
Gember, A.1
Anand, A.2
Akella, A.3
-
27
-
-
0036805563
-
DNS performance and the effectiveness of caching
-
J. Jung, E. Sit, H. Balakrishnan, and R. Morris. DNS performance and the effectiveness of caching. IEEE/ACM Transactions on Networking, 10(5):589-603, 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.5
, pp. 589-603
-
-
Jung, J.1
Sit, E.2
Balakrishnan, H.3
Morris, R.4
-
29
-
-
0004053867
-
-
O'Reilly Media, 5th edition edition
-
C. Liu and P. Albitz. DNS and BIND. O'Reilly Media, 5th edition edition, 2006.
-
(2006)
DNS and BIND
-
-
Liu, C.1
Albitz, P.2
-
31
-
-
0003757663
-
Domain names - concepts and facilities
-
RFC 1034 (Standard), Nov. Updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, 4035, 4592, 5936
-
P. Mockapetris. Domain names - concepts and facilities. RFC 1034 (Standard), Nov. 1987. Updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, 4035, 4592, 5936.
-
(1987)
-
-
Mockapetris, P.1
-
32
-
-
0003757661
-
Domain names - implementation and specification
-
RFC 1035 (Standard), Nov
-
P. Mockapetris. Domain names - implementation and specification. RFC 1035 (Standard), Nov. 1987. Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2845, 3425, 3658, 4033, 4034, 4035, 4343, 5936, 5966.
-
(1987)
Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2845, 3425, 3658, 4033, 4034, 4035, 4343, 5936, 5966
-
-
Mockapetris, P.1
-
33
-
-
85180406336
-
-
Sept
-
Nino Fred Gutierrez. Android.Gonesixty. http://www.symantec.com/security_response/writeup.jsp?docid=2011-093001-2649-99, Sept. 2011.
-
(2011)
Android.Gonesixty
-
-
Gutierrez, Nino Fred1
-
34
-
-
84860698961
-
-
June
-
Piotr Krysiuk. Android.Ggtracker. http://www.symantec.com/security_response/writeup.jsp?docid=2011-062208-5013-99, June 2011.
-
(2011)
Android.Ggtracker
-
-
Krysiuk, Piotr1
-
38
-
-
85180401989
-
-
Mar
-
Takashi Katsuki. Android.Walkinwat. http://www.symantec.com/security_response/writeup.jsp?docid=2011-033008-4831-99, Mar. 2011.
-
(2011)
Android.Walkinwat
-
-
Katsuki, Takashi1
-
40
-
-
79955803340
-
From Mobile Phones to Responsible Devices
-
June
-
P. Traynor, C. Amrutkar, V. Rao, T. Jaeger, P. McDaniel, and T. La Porta. From Mobile Phones to Responsible Devices. Journal of Security and Communication Networks (SCN), 4(6):719-726, June 2011.
-
(2011)
Journal of Security and Communication Networks (SCN)
, vol.4
, Issue.6
, pp. 719-726
-
-
Traynor, P.1
Amrutkar, C.2
Rao, V.3
Jaeger, T.4
McDaniel, P.5
La Porta, T.6
-
41
-
-
55849122324
-
Exploiting open functionality in sms-capable cellular networks
-
P. Traynor, W. Enck, P. McDaniel, and T. L. Porta. Exploiting open functionality in sms-capable cellular networks. Journal of Computer Security, 16(6):713-742, 2008.
-
(2008)
Journal of Computer Security
, vol.16
, Issue.6
, pp. 713-742
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
Porta, T. L.4
-
42
-
-
61449199429
-
Mitigating attacks on open functionality in sms-capable cellular networks
-
P. Traynor, W. Enck, P. McDaniel, and T. L. Porta. Mitigating attacks on open functionality in sms-capable cellular networks. IEEE/ACM Transactions on Networking, 17(1):40-53, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 40-53
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
Porta, T. L.4
-
43
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, T. L. Porta, and P. McDaniel. On cellular botnets: Measuring the impact of malicious devices on a cellular network core. In Proceedings of the ACM Conference on Computer and Communications Security, 2009.
-
(2009)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
Porta, T. L.6
McDaniel, P.7
-
46
-
-
85180411358
-
-
May
-
Yi Li. Android.Notcompatible. http://www.symantec.com/security_response/writeup. jsp?docid=2012-050307-2712-99, May 2012.
-
(2012)
Android.Notcompatible
-
-
Li, Yi1
-
48
-
-
85172622386
-
Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS), 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|