-
4
-
-
84969365539
-
-
Bots mobilize. http://www.dmnews.com/botsmobilize/ article/291566/, 2013.
-
(2013)
Bots Mobilize
-
-
-
6
-
-
84969338757
-
-
Mopub android sdk. https: //github.com/mopub/mopub-android-sdk, 2013.
-
(2013)
Mopub Android Sdk
-
-
-
8
-
-
84936122192
-
-
Antutu benchmark. https: //play.google.com/store/apps/details?id= com.google.android.stardroid&hl=en, 2014.
-
(2014)
Antutu Benchmark
-
-
-
10
-
-
51849104627
-
Trustzone: Integrated hardware and software security
-
T. Alves and D. Felton. Trustzone: Integrated hardware and software security. ARM white paper, 3(4), 2004.
-
(2004)
ARM White Paper
, vol.3
, Issue.4
-
-
Alves, T.1
Felton, D.2
-
11
-
-
84874786070
-
Obliviad: Provably secure and practical online behavioral advertising
-
IEEE
-
M. Backes, A. Kate, M. Maffei, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 257-271. IEEE, 2012.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 257-271
-
-
Backes, M.1
Kate, A.2
Maffei, M.3
Pecina, K.4
-
14
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In NDSS, 2012.
-
(2012)
NDSS
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
15
-
-
84871104186
-
Adaptive pipeline parallelism for image feature extraction algorithms
-
IEEE
-
P. Chen, D. Yang, W. Zhang, Y. Li, B. Zang, and H. Chen. Adaptive pipeline parallelism for image feature extraction algorithms. In Parallel Processing (ICPP), 2012 41st International Conference on, pages 299-308. IEEE, 2012.
-
(2012)
Parallel Processing (ICPP), 2012 41st International Conference on
, pp. 299-308
-
-
Chen, P.1
Yang, D.2
Zhang, W.3
Li, Y.4
Zang, B.5
Chen, H.6
-
16
-
-
84903119671
-
Madfraud: Investigating ad fraud in android applications
-
ACM
-
J. Crussell, R. Stevens, and H. Chen. Madfraud: investigating ad fraud in android applications. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services, pages 123-134. ACM, 2014.
-
(2014)
Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services
, pp. 123-134
-
-
Crussell, J.1
Stevens, R.2
Chen, H.3
-
17
-
-
54249146662
-
Online advertising fraud
-
N. Daswani, C. Mysen, V. Rao, S. Weis, K. Gharachorloo, and S. Ghosemajumder. Online advertising fraud. Crimeware: understanding new attacks and defenses, 2008.
-
(2008)
Crimeware: Understanding New Attacks and Defenses
-
-
Daswani, N.1
Mysen, C.2
Rao, V.3
Weis, S.4
Gharachorloo, K.5
Ghosemajumder, S.6
-
18
-
-
84894515302
-
Measuring and fingerprinting click-spam in ad networks
-
ACM
-
V. Dave, S. Guha, and Y. Zhang. Measuring and fingerprinting click-spam in ad networks. In Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, pages 175-186. ACM, 2012.
-
(2012)
Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 175-186
-
-
Dave, V.1
Guha, S.2
Zhang, Y.3
-
20
-
-
79957480604
-
A comprehensive analysis and parallelization of an image retrieval algorithm
-
IEEE
-
Z. Fang, D. Yang, W. Zhang, H. Chen, and B. Zang. A comprehensive analysis and parallelization of an image retrieval algorithm. In Performance Analysis of Systems and Software (ISPASS), 2011 IEEE International Symposium on, pages 154-164. IEEE, 2011.
-
(2011)
Performance Analysis of Systems and Software (ISPASS), 2011 IEEE International Symposium on
, pp. 154-164
-
-
Fang, Z.1
Yang, D.2
Zhang, W.3
Chen, H.4
Zang, B.5
-
22
-
-
84943299684
-
Privad: Practical privacy in online advertising
-
S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In NSDI, 2011.
-
(2011)
NSDI
-
-
Guha, S.1
Cheng, B.2
Francis, P.3
-
25
-
-
84906872126
-
Building trusted path on untrusted device drivers for mobile devices
-
ACM
-
W. Li, M. Ma, J. Han, Y. Xia, B. Zang, C.-K. Chu, and T. Li. Building trusted path on untrusted device drivers for mobile devices. In Proceedings of 5th Asia-Pacific Workshop on Systems, page 8. ACM, 2014.
-
(2014)
Proceedings of 5th Asia-Pacific Workshop on Systems
, pp. 8
-
-
Li, W.1
Ma, M.2
Han, J.3
Xia, Y.4
Zang, B.5
Chu, C.-K.6
Li, T.7
-
26
-
-
84964821290
-
Decaf: Detecting and characterizing ad fraud in mobile apps
-
USENIX Association
-
B. Liu, S. Nath, R. Govindan, and J. Liu. Decaf: detecting and characterizing ad fraud in mobile apps. In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, pages 57-70. USENIX Association, 2014.
-
(2014)
Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
, pp. 57-70
-
-
Liu, B.1
Nath, S.2
Govindan, R.3
Liu, J.4
-
28
-
-
84864334953
-
Software abstractions for trusted sensors
-
ACM
-
H. Liu, S. Saroiu, A. Wolman, and H. Raj. Software abstractions for trusted sensors. In Proceedings of the 10th international conference on Mobile systems, applications, and services, pages 365-378. ACM, 2012.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
, pp. 365-378
-
-
Liu, H.1
Saroiu, S.2
Wolman, A.3
Raj, H.4
-
29
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
D. G. Lowe. Distinctive image features from scale-invariant keypoints. International journal of computer vision, 60(2):91-110, 2004.
-
(2004)
International Journal of Computer Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
31
-
-
79959947618
-
Whatąrs̈ clicking what? Techniques and innovations of todayąrs̈ clickbots
-
Springer
-
B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson. Whatąrs̈ clicking what? techniques and innovations of todayąrs̈ clickbots. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 164-183. Springer, 2011.
-
(2011)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 164-183
-
-
Miller, B.1
Pearce, P.2
Grier, C.3
Kreibich, C.4
Paxson, V.5
-
33
-
-
84910676499
-
Characterizing large-scale click fraud in zeroaccess
-
New York, NY, USA, ACM
-
P. Pearce, V. Dave, C. Grier, K. Levchenko, S. Guha, D. McCoy, V. Paxson, S. Savage, and G. M. Voelker. Characterizing large-scale click fraud in zeroaccess. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 141-152, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14
, pp. 141-152
-
-
Pearce, P.1
Dave, V.2
Grier, C.3
Levchenko, K.4
Guha, S.5
McCoy, D.6
Paxson, V.7
Savage, S.8
Voelker, G.M.9
-
34
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
ACM
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner. Addroid: Privilege separation for applications and advertisers in android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pages 71-72. ACM, 2012.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
, pp. 71-72
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
35
-
-
84875501099
-
Splitting the bill for mobile data with simlets
-
ACM
-
H. Raj, S. Saroiu, A. Wolman, and J. Padhye. Splitting the bill for mobile data with simlets. In Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, page 1. ACM, 2013.
-
(2013)
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
, pp. 1
-
-
Raj, H.1
Saroiu, S.2
Wolman, A.3
Padhye, J.4
-
36
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
IEEE
-
A. Seshadri, A. Perrig, L. Van Doorn, and P. Khosla. Swatt: Software-based attestation for embedded devices. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, pages 272-282. IEEE, 2004.
-
(2004)
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
37
-
-
84954474056
-
Adsplit: Separating smartphone advertising from applications
-
S. Shekhar, M. Dietz, and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. In USENIX Security Symposium, pages 553-567, 2012.
-
(2012)
USENIX Security Symposium
, pp. 553-567
-
-
Shekhar, S.1
Dietz, M.2
Wallach, D.S.3
-
38
-
-
82655182920
-
Logical attestation: An authorization architecture for trustworthy computing
-
ACM
-
E. G. Sirer, W. de Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. B. Schneider. Logical attestation: an authorization architecture for trustworthy computing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 249-264. ACM, 2011.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 249-264
-
-
Sirer, E.G.1
De Bruijn, W.2
Reynolds, P.3
Shieh, A.4
Walsh, K.5
Williams, D.6
Schneider, F.B.7
-
39
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy preserving targeted advertising. In NDSS, 2010.
-
(2010)
NDSS
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
-
40
-
-
74349098073
-
Efficient cache attacks on aes, and countermeasures
-
E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attacks on aes, and countermeasures. Journal of Cryptology, 23(1):37-71, 2010.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
41
-
-
84881219022
-
Design, implementation and verification of an extensible and modular hypervisor framework
-
IEEE
-
A. Vasudevan, S. Chaki, L. Jia, J. McCune, J. Newsome, and A. Datta. Design, implementation and verification of an extensible and modular hypervisor framework. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 430-444. IEEE, 2013.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 430-444
-
-
Vasudevan, A.1
Chaki, S.2
Jia, L.3
McCune, J.4
Newsome, J.5
Datta, A.6
-
42
-
-
84880265063
-
Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks
-
IEEE
-
Y. Xia, Y. Liu, and H. Chen. Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks. In High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on, pages 246-257. IEEE, 2013.
-
(2013)
High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on
, pp. 246-257
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
-
43
-
-
85076305746
-
Flush+reload: A high resolution, low noise, 13 cache side-channel attack
-
San Diego, CA, Aug, USENIX Association
-
Y. Yarom and K. Falkner. Flush+reload: A high resolution, low noise, 13 cache side-channel attack. In 23rd USENIX Security Symposium (USENIX Security 14), pages 719-732, San Diego, CA, Aug. 2014. USENIX Association.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
, pp. 719-732
-
-
Yarom, Y.1
Falkner, K.2
-
45
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
ACM
-
F. Zhang, J. Chen, H. Chen, and B. Zang. Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 203-216. ACM, 2011.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|