-
3
-
-
84955596642
-
Creating temporary security credentials for mobile apps using identity providers
-
June
-
Amazon Web Services. Creating Temporary Security Credentials for Mobile Apps Using Identity Providers. AWS Security Token Service, June 2011. http://docs. aws.amazon. com/STS/latest/UsingSTS/CreatingWIF.html.
-
(2011)
AWS Security Token Service
-
-
Amazon Web Services1
-
4
-
-
84955588150
-
Authenticating users of AWS mobile applications with a token vending machine
-
July
-
Amazon Web Services. Authenticating Users of AWS Mobile Applications with a Token Vending Machine. AWS Identity and Access Management, July 2013. http://aws.amazon. com/articles/4611615499399490.
-
(2013)
AWS Identity and Access Management
-
-
Amazon Web Services1
-
5
-
-
84955619250
-
Getting started with the AWS SDK for android
-
Sept.
-
Amazon Web Services. Getting Started with the AWS SDK for Android. AWS SDK for Android, Sept. 2013. http://docs.aws.amazon. com/mobile/sdkforandroid/gsg/Welcome.html.
-
(2013)
AWS SDK for Android
-
-
Amazon Web Services1
-
6
-
-
84955618378
-
-
AndroLib. http://www.androlib.com.
-
-
-
-
7
-
-
84955583371
-
-
AppBrain. http://www.appbrain. com.
-
-
-
-
8
-
-
84955589288
-
Amazon is downloading apps from google play and inspecting them
-
Mar.
-
R. Bala. Amazon Is Downloading Apps From Google Play and Inspecting Them. Y Combinator Hacker News, Mar. 2014. https://news.ycombinator.com/item?id=7491272.
-
(2014)
Y Combinator Hacker News
-
-
Bala, R.1
-
9
-
-
84955605972
-
-
Capistrano. http://capistranorb.com.
-
-
-
Capistrano1
-
10
-
-
84955562278
-
-
Chef. http://www.getchef.com.
-
-
-
Chef1
-
11
-
-
84955617309
-
Amazon is decompiling our apps in security gaff hunt, says dev
-
Mar.
-
R. Chirgwin. Amazon Is Decompiling Our Apps in Security Gaff Hunt, Says Dev. The Register, Mar. 2014. http://www.theregister.co.uk/2014/03/31/dev-lashes-out-at-amazon-for-decompiling-his-app.
-
(2014)
The Register
-
-
Chirgwin, R.1
-
12
-
-
79955951954
-
CloneCloud: Elastic execution between mobile device and cloud
-
Apr.
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. CloneCloud: Elastic Execution Between Mobile Device and Cloud. In Proceedings of the 6th European Conference on Computer systems (EuroSys 2011), Apr. 2011.
-
(2011)
Proceedings of the 6th European Conference on Computer Systems (EuroSys 2011)
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
17
-
-
84955594287
-
-
dex2jar. http://code.google.com/p/dex2jar.
-
-
-
Dex2jar1
-
18
-
-
84874770365
-
What's app?: A wide-scale measurement study of smart phone markets
-
Apr.
-
N. d'Heureuse, F. Huici, M. Arumaithurai, M. Ahmed, K. Papagiannaki, and S. Niccolini. What's App?: A Wide-Scale Measurement Study of Smart Phone Markets. Mobile Computing and Communications Review, 16(2):16-27, Apr. 2012.
-
(2012)
Mobile Computing and Communications Review
, vol.16
, Issue.2
, pp. 16-27
-
-
D'Heureuse, N.1
Huici, F.2
Arumaithurai, M.3
Ahmed, M.4
Papagiannaki, K.5
Niccolini, S.6
-
19
-
-
84955577857
-
-
Elasticsearch. http://www.elasticsearch.org.
-
-
-
-
21
-
-
84955614072
-
-
Facebook. Login Security. https://developers.facebook. com/docs/facebook-login/security.
-
Login Security
-
-
Facebook1
-
22
-
-
80755181021
-
A survey of mobile malware in the wild
-
July
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A Survey of Mobile Malware in the Wild. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011), July 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011)
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
23
-
-
84881131952
-
AdRob: Examining the landscape and impact of android application plagiarism
-
June
-
C. Gibler, R. Stevens, J. Crussell, H. Chen, H. Zang, and H. Choi. AdRob: Examining the Landscape and Impact of Android Application Plagiarism. In Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013), June 2013.
-
(2013)
Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys 2013)
-
-
Gibler, C.1
Stevens, R.2
Crussell, J.3
Chen, H.4
Zang, H.5
Choi, H.6
-
25
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day android malware detection
-
June
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys 2012), June 2012.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys 2012)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
27
-
-
84888999727
-
Juxtapp: A scalable system for detecting code reuse among android applications
-
July
-
S. Hanna, L. Huang, E. X. Wu, S. Li, C. Chen, and D. Song. Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications. In Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2012), July 2012.
-
(2012)
Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2012)
-
-
Hanna, S.1
Huang, L.2
Wu, E.X.3
Li, S.4
Chen, C.5
Song, D.6
-
29
-
-
84955604423
-
-
MixRank. http://www.mixrank.com.
-
-
-
MixRank1
-
30
-
-
84955599420
-
My $500 cloud security screwup-UPDATED
-
Jan.
-
R. Mogull. My $500 Cloud Security Screwup-UPDATED. Securosis Blog, Jan. 2014. https://securosis.com/blog/my-500-cloud-security-screwup.
-
(2014)
Securosis Blog
-
-
Mogull, R.1
-
32
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
May
-
C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach. Sci. Comput. Program., 74(7):470-495, May 2009.
-
(2009)
Sci. Comput. Program.
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
40
-
-
84869848489
-
Refactoring android Java code for on-demand computation offloading
-
Oct.
-
Y. Zhang, G. Huang, X. Liu, W. Zhang, H. Mei, and S. Yang. Refactoring Android Java Code for On-Demand Computation Offloading. In Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012), Oct. 2012.
-
(2012)
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA 2012)
-
-
Zhang, Y.1
Huang, G.2
Liu, X.3
Zhang, W.4
Mei, H.5
Yang, S.6
-
41
-
-
84874828789
-
Fast, scalable detection of "piggybacked" mobile applications
-
Feb.
-
W. Zhou, Y. Zhou, M. C. Grace, X. Jiang, and S. Zou. Fast, Scalable Detection of "Piggybacked" Mobile Applications. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013), Feb. 2013.
-
(2013)
Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013)
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.C.3
Jiang, X.4
Zou, S.5
-
44
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Feb.
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012), Feb. 2012.
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|