-
3
-
-
84954478677
-
-
APKfuscator. https://github.com/strazzere/APKfuscator.
-
APKfuscator
-
-
-
4
-
-
84954541306
-
-
Apktool. https://code.google.com/p/android-apktool/.
-
Apktool
-
-
-
5
-
-
84954514683
-
-
App Shield. http://www.wandoujia.com/apps/com.gmail.exathink.appshield.
-
App Shield
-
-
-
7
-
-
84874823671
-
-
cyanogenmod. http://www.cyanogenmo d.org.
-
Cyanogenmod
-
-
-
8
-
-
84893215492
-
-
DroidBox. https://code.google.com/p/droidbox/.
-
DroidBox
-
-
-
12
-
-
84954556277
-
-
monkey. http://developer.android.com/tools/help/monkey.html.
-
Monkey
-
-
-
14
-
-
84874856400
-
-
smali/baksmali. https://code.google.com/p/smali/.
-
Smali/baksmali
-
-
-
15
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: Analyzing the android permission specification. In CCS, 2012.
-
(2012)
CCS
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
16
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In NDSS, 2012.
-
(2012)
NDSS
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
17
-
-
85047891952
-
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
-
S. Bugiel, S. Heuser, and A.-R. Sadeghi. Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Bugiel, S.1
Heuser, S.2
Sadeghi, A.-R.3
-
21
-
-
84881150155
-
RetroSkeleton: Retrofitting android apps
-
B. Davis and H. Chen. RetroSkeleton: Retrofitting android apps. In MobiSys, 2013.
-
(2013)
MobiSys
-
-
Davis, B.1
Chen, H.2
-
22
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
M. Dietz, S. Sh ekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. QUIRE: Lightweight provenance for smart phone operating systems. In USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
23
-
-
84888331381
-
Pios: Detecting privacy leaks in ios applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting privacy leaks in ios applications. In NDSS, 2011.
-
(2011)
NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
27
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In CCS, 2011.
-
(2011)
CCS
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
28
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
29
-
-
84894125748
-
Android: One root to own them all
-
J. Forristal. Android: One root to own them all. In Blackhat USA 2013, 2013.
-
(2013)
Blackhat USA 2013
-
-
Forristal, J.1
-
30
-
-
84954474204
-
Google
-
Google. Platform versions. http://developer.android.com/about/dashboards/index.html.
-
Platform Versions
-
-
-
31
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In NDSS, 2012.
-
(2012)
NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
32
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and accurate zero-day android malware detection. In MobiSys, 2012.
-
(2012)
MobiSys
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
33
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In WiSec, 2012.
-
(2012)
WiSec
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
34
-
-
84954559809
-
Win at reversing: Api tracing and sandboxing through inline hooking
-
N. Harbour. Win at reversing: Api tracing and sandboxing through inline hooking. In DEFCON, 2009.
-
(2009)
DEFCON
-
-
Harbour, N.1
-
36
-
-
84869416020
-
CHEX: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. CHEX: Statically vetting android apps for component hijacking vulnerabilities. In CCS, 2012.
-
(2012)
CCS
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
37
-
-
84862909641
-
Attacks on webview in the android system
-
T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin. Attacks on webview in the android system. In ACSAC, 2011.
-
(2011)
ACSAC
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
41
-
-
84893303334
-
Patchdroid: Scalable third-party security patches for android devices
-
C. Mulliner, J. Oberheide, W. Robertson, and E. Kirda. Patchdroid: Scalable third-party security patches for android devices. In ACSAC, 2013.
-
(2013)
ACSAC
-
-
Mulliner, C.1
Oberheide, J.2
Robertson, W.3
Kirda, E.4
-
42
-
-
84954550597
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
N. Nethercote and J. Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation. ACM Sigplan Notices.
-
ACM Sigplan Notices
-
-
Nethercote, N.1
Seward, J.2
-
43
-
-
27544444280
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Internet Society, 2005.
-
(2005)
Internet Society
-
-
Newsome, J.1
Song, D.2
-
46
-
-
84878346861
-
Improving host security with system call policies
-
N. Provos. Improving host security with system call policies. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Provos, N.1
-
47
-
-
84874865861
-
AppsPlayground: Automatic security analysis of smartphone applications
-
V. Rastogi, Y. Chen, and W. Enck. AppsPlayground: Automatic security analysis of smartphone applications. In CODASPY, 2013.
-
(2013)
CODASPY
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
48
-
-
84878002579
-
DroidChameleon: Evaluating android anti-malware against transformation attacks
-
V. Rastogi, Y. Chen, and X. Jiang. DroidChameleon: Evaluating android anti-malware against transformation attacks. In ASIACCS, 2013.
-
(2013)
ASIACCS
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
50
-
-
84954550189
-
Dex education: Practicing safe dex
-
T. Strazzere. Dex education: Practicing safe dex. In Blackhat USA 2012, 2012.
-
(2012)
Blackhat USA 2012
-
-
Strazzere, T.1
-
51
-
-
84906743353
-
Jekyll on iOS: When benign apps become evil
-
T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on iOS: When benign apps become evil. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Wang, T.1
Lu, K.2
Lu, L.3
Chung, S.4
Lee, W.5
-
52
-
-
84889012971
-
The impact of vendor customizations on android security
-
L.Wu, M. Grace, Y. Zhou, C. Wu, and X. Jiang. The impact of vendor customizations on android security. In CCS, 2013.
-
(2013)
CCS
-
-
Wu, L.1
Grace, M.2
Zhou, Y.3
Wu, C.4
Jiang, X.5
-
53
-
-
84954512130
-
-
xda-developers. PDroid. http://forum.xda-developers.com/showthread.php?t=1357056.
-
PDroid
-
-
-
54
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
R. Xu, H. Sä?di, and R. Anderson. Aurasium: Practical policy enforcement for android applications. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Xu, R.1
Sädi, H.2
Anderson, R.3
-
55
-
-
85060493868
-
DroidScope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
L. K. Yan and H. Yin. DroidScope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Yan, L.K.1
Yin, H.2
-
56
-
-
84889041424
-
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang. AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection. In CCS, 2013.
-
(2013)
CCS
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
57
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. Wang, and B. Zang. Vetting undesirable behaviors in android apps with permission use analysis. In CCS, 2013.
-
(2013)
CCS
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
Gu, G.5
Ning, P.6
Wang, X.7
Zang, B.8
-
58
-
-
84869757378
-
Smartdroid: An automatic system for revealing ui-based trigger conditions in android applications
-
C. Zheng, S. Zhu, S. D ai, G. Gu, X. Gong, X. Han, and W. Zou. Smartdroid: An automatic system for revealing ui-based trigger conditions in android applications. In Proc. of the second ACM workshop on Security and privacy in smartphones and mo bile devices, 2012.
-
(2012)
Proc. of the Second ACM Workshop on Security and Privacy in Smartphones and Mo Bile Devices
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Han, X.6
Zou, W.7
-
59
-
-
84889078034
-
ADAM: An automatic and extensible platform to stress test android anti-virus systems
-
M. Zheng, P. P. C. Lee, and J. C. S. Lui. ADAM: An automatic and extensible platform to stress test android anti-virus systems. In DIMVA, 2013.
-
(2013)
DIMVA
-
-
Zheng, M.1
Lee, P.P.C.2
Lui, J.C.S.3
-
60
-
-
84984924868
-
DroidRay: A security evaluation system for customized android firmwares
-
M. Zheng, M. Sun, and J. Lui. DroidRay: A security evaluation system for customized android firmwares. In ASIACCS, 2014.
-
(2014)
ASIACCS
-
-
Zheng, M.1
Sun, M.2
Lui, J.3
-
61
-
-
84893446426
-
DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware
-
M. Zheng, M. Sun, and J. C. S. Lui. DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware. In TrustCom, 2013.
-
(2013)
TrustCom
-
-
Zheng, M.1
Sun, M.2
Lui, J.C.S.3
-
64
-
-
85102224279
-
Detecting passive content leaks and pollution in android applications
-
Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In NDSS, 2013.
-
(2013)
NDSS
-
-
Zhou, Y.1
Jiang, X.2
-
65
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012.
-
(2012)
NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|