-
5
-
-
18744373738
-
-
Wordnet. http://wordnet.princeton.edu/.
-
Wordnet.
-
-
-
11
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
K. Au, Y. Zhou, Z. Huang, and D. Lie. Pscout: Analyzing the android permission specification. In Proc. ACM CCS, 2012.
-
(2012)
Proc. ACM CCS
-
-
Au, K.1
Zhou, Y.2
Huang, Z.3
Lie, D.4
-
12
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
T. Breaux and A. Anton. Analyzing regulatory rules for privacy and security requirements. IEEE Trans. on Software Eng., 2008.
-
(2008)
IEEE Trans. on Software Eng
-
-
Breaux, T.1
Anton, A.2
-
13
-
-
85035783387
-
Parsing to stanford dependencies: Trade-offs between speed and accuracy
-
D. Cer, M. Marnee, D. Jurafsky, and C. Manning. Parsing to stanford dependencies: Trade-offs between speed and accuracy. In Proc. LREC, 2010.
-
(2010)
Proc. LREC
-
-
Cer, D.1
Marnee, M.2
Jurafsky, D.3
Manning, C.4
-
16
-
-
84869821127
-
I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns
-
A. Felt, S. Egelman, and D. Wagner. I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns. In Proc. ACM SPSM, 2012.
-
(2012)
Proc. ACM SPSM
-
-
Felt, A.1
Egelman, S.2
Wagner, D.3
-
17
-
-
84880915872
-
Computing semantic relatedness using wikipedia-based explicit semantic analysis
-
E. Gabrilovich and S. Markovitch. Computing semantic relatedness using wikipedia-based explicit semantic analysis. In Proc. IJCAI, 2007.
-
(2007)
Proc. IJCAI
-
-
Gabrilovich, E.1
Markovitch, S.2
-
19
-
-
84865720897
-
Strong higher order mutation-based test data generation
-
M. Harman, Y. Jia, and W. B. Langdon. Strong higher order mutation-based test data generation. In Proc. ESEC/FSE, 2011.
-
(2011)
Proc. ESEC/FSE
-
-
Harman, M.1
Jia, Y.2
Langdon, W.B.3
-
21
-
-
44149083477
-
Automated generation of test cases using model-driven architecture
-
A. Javed, P. Strooper, and G. Watson. Automated generation of test cases using model-driven architecture. In Proc. AST, 2007.
-
(2007)
Proc. AST
-
-
Javed, A.1
Strooper, P.2
Watson, G.3
-
22
-
-
84943159826
-
Iccta: Detecting inter-component privacy leaks in android apps
-
L. Li, A. Bartel, T. Bissyande, J. Klein, Y. Traon, S. Arzt, R. Siegfried, E. Bodden, D. Octeau, and P. Mcdaniel. Iccta: Detecting inter-component privacy leaks in android apps. In Proc. ICSE, 2015.
-
(2015)
Proc. ICSE
-
-
Li, L.1
Bartel, A.2
Bissyande, T.3
Klein, J.4
Traon, Y.5
Arzt, S.6
Siegfried, R.7
Bodden, E.8
Octeau, D.9
Mcdaniel, P.10
-
23
-
-
84959910133
-
A step towards usable privacy policy: Automatic alignment of privacy statements
-
F. Liu, R. Ramanath, N. Sadeh, and N. Smith. A step towards usable privacy policy: Automatic alignment of privacy statements. In Proc. COLING, 2014.
-
(2014)
Proc. COLING
-
-
Liu, F.1
Ramanath, R.2
Sadeh, N.3
Smith, N.4
-
26
-
-
84955497427
-
Privacy informer: An automatic privacy description generator for mobile apps
-
D. Miao and L. Kagal. Privacy informer: An automatic privacy description generator for mobile apps. In Proc. ASE PASSAT, 2014.
-
(2014)
Proc. ASE PASSAT
-
-
Miao, D.1
Kagal, L.2
-
27
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending android permission model and enforcement with user-defined runtime constraints. In Proc. ACM ASIACCS, 2010.
-
(2010)
Proc. ACM ASIACCS
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
28
-
-
85075955161
-
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Traon. Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In Proc. USENIX Security, 2013.
-
(2013)
Proc. USENIX Security
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Traon, Y.7
-
30
-
-
84925070537
-
Vulhunter: Toward discovering vulnerabilities in android applications
-
C. Qian, X. Luo, Y. Le, and G. Gu. Vulhunter: Toward discovering vulnerabilities in android applications. IEEE Micro, 2015.
-
(2015)
IEEE Micro
-
-
Qian, C.1
Luo, X.2
Le, Y.3
Gu, G.4
-
31
-
-
84906929853
-
Unsupervised alignment of privacy policies using hidden markov models
-
R. Ramanath, F. Liu, N. Sadeh, and N. Smith. Unsupervised alignment of privacy policies using hidden markov models. In Proc. ACL, 2014.
-
(2014)
Proc. ACL
-
-
Ramanath, R.1
Liu, F.2
Sadeh, N.3
Smith, N.4
-
32
-
-
84920559779
-
A machine-learning approach for classifying and categorizing android sources and sinks
-
S. Rasthofer, S. Arzt, and E. Bodden. A machine-learning approach for classifying and categorizing android sources and sinks. In Proc. NDSS, 2014.
-
(2014)
Proc. NDSS
-
-
Rasthofer, S.1
Arzt, S.2
Bodden, E.3
-
33
-
-
0034971203
-
Coverage based test-case generation using model checkers
-
S. Rayadurgam and M. P. Heimdahl. Coverage based test-case generation using model checkers. In Proc. ECBS, 2001.
-
(2001)
Proc. ECBS
-
-
Rayadurgam, S.1
Heimdahl, M.P.2
-
34
-
-
84874835750
-
Appprofiler: A exible method of exposing privacy-related behavior in android applications to end users
-
S. Rosen, Z. Qian, and Z. M. Mao. Appprofiler: A exible method of exposing privacy-related behavior in android applications to end users. In Proc. CODASPY, 2013.
-
(2013)
Proc. CODASPY
-
-
Rosen, S.1
Qian, Z.2
Mao, Z.M.3
-
35
-
-
84922821366
-
Encouraging privacy by design concepts with privacy policy auto-generation in eclipse (page
-
M. Rowan and J. Dehlinger. Encouraging privacy by design concepts with privacy policy auto-generation in eclipse (page). In Proc. ETX, 2014.
-
(2014)
Proc. ETX
-
-
Rowan, M.1
Dehlinger, J.2
-
36
-
-
84955464607
-
A case for test-code generation in model-driven systems
-
M. Rutherford and A. Wolf. A case for test-code generation in model-driven systems. In Proc. GPCE, 2003.
-
(2003)
Proc. GPCE
-
-
Rutherford, M.1
Wolf, A.2
-
37
-
-
84955450436
-
Information ows as a permission mechanism
-
F. Shen, N. Vishnubhotla, C. Todarka, M. Arora, B. Dhandapani, E. J. Lehner, S. Y. Ko, and L. Ziarek. Information ows as a permission mechanism. In Proc. ASE, 2014.
-
(2014)
Proc. ASE
-
-
Shen, F.1
Vishnubhotla, N.2
Todarka, C.3
Arora, M.4
Dhandapani, B.5
Lehner, E.J.6
Ko, S.Y.7
Ziarek, L.8
-
38
-
-
84955515568
-
Relation extraction for inferring access control rules from natural language artifacts
-
J. Slankas, X. Xiao, L. Williams, and T. Xie. Relation extraction for inferring access control rules from natural language artifacts. In Proc. ACSAC, 2014.
-
(2014)
Proc. ACSAC
-
-
Slankas, J.1
Xiao, X.2
Williams, L.3
Xie, T.4
-
39
-
-
84871303885
-
Automated extraction of security policies from natural language software documents
-
X. Xiao, A. Paradkar, S. Thummalapenta, and T. Xie. Automated extraction of security policies from natural language software documents. In Proc. ACM FSE, 2012.
-
(2012)
Proc. ACM FSE
-
-
Xiao, X.1
Paradkar, A.2
Thummalapenta, S.3
Xie, T.4
-
40
-
-
84899924212
-
Open information extraction with tree kernels
-
Y. Xu, M.-Y. Kim, K. Quinn, R. Goebel, and D. Barbosa. Open information extraction with tree kernels. In HLT-NAACL, 2013.
-
(2013)
HLT-NAACL
-
-
Xu, Y.1
Kim, M.-Y.2
Quinn, K.3
Goebel, R.4
Barbosa, D.5
-
42
-
-
85066762295
-
Privee: An architecture for automatically analyzing web privacy policies
-
S. Zimmeck and S. M. Bellovin. Privee: An architecture for automatically analyzing web privacy policies. In Proc. USENIX Security, 2014.
-
(2014)
Proc. USENIX Security
-
-
Zimmeck, S.1
Bellovin, S.M.2
|