-
1
-
-
84901668696
-
-
Adblock plus.
-
Adblock plus. http://adblockplus.org/
-
-
-
-
2
-
-
84901668588
-
-
AdMarvel.
-
AdMarvel. http://www.admarvel.com/
-
-
-
-
3
-
-
84901668589
-
-
Dashboards: Platform versions.
-
Dashboards: Platform versions. http://web.archive.org/web/20130205234427/ http://developer.android.com/about/dashboards/index.html
-
-
-
-
4
-
-
84901668590
-
-
HTTP state management mechanism RFC.
-
HTTP state management mechanism RFC. http://www.rfc-editor.org/rfc/ rfc6265. txt
-
-
-
-
5
-
-
84901668591
-
-
Malware delivered by Yahoo, Fox, Google ads.
-
Malware delivered by Yahoo, Fox, Google ads. http://news.cnet.com/8301- 27080 3-20000898-245.html
-
-
-
-
6
-
-
84901668592
-
-
Malware-infected WinRAR distributed through Google AdWords.
-
Malware-infected WinRAR distributed through Google AdWords. http://www.zdnet.com/blog/security/malware-infected-winrar-distributed-through- google-adwords/2405
-
-
-
-
7
-
-
84901668583
-
-
Medialets.
-
Medialets. http://www.medialets.com/
-
-
-
-
8
-
-
84901668584
-
-
Millennial media.
-
Millennial media. http://www.millennialmedia.com/
-
-
-
-
9
-
-
84901668585
-
-
nsIContentPolicy.
-
nsIContentPolicy. https://developer.mozilla.org/en-US/docs/XPCOM Interface Reference/nsIContentPolicy
-
-
-
-
10
-
-
84901668586
-
-
Old Habits Die Hard: Cross-Zone Scripting in Dropbox & Google Drive Mobile Apps.
-
Old Habits Die Hard: Cross-Zone Scripting in Dropbox & Google Drive Mobile Apps. http://blog.watchfire.com/wfblog/2012/10/old-habits-die-hard.html
-
-
-
-
11
-
-
84901668587
-
-
Security Enhancements in Jelly Bean.
-
Security Enhancements in Jelly Bean. http://android-developers.blogspot. com/2013/02/security-enhancements-in-jelly-bean.html
-
-
-
-
12
-
-
84901668579
-
-
Smali and baksmali.
-
Smali and baksmali. http://code.google.com/p/smali/
-
-
-
-
13
-
-
84901668580
-
-
Times web ads show security breach.
-
Times web ads show security breach. http://www.nytimes.com/2009/09/15/ technology/internet/15adco.html
-
-
-
-
14
-
-
80755127060
-
Short paper: A look at smart-phone permission models
-
Au, K.W.Y., Zhou, Y.F., Huang, Z., Gill, P., Lie, D.: Short paper: a look at smart-phone permission models. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011)
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
15
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
-
Batyuk, L., Herpich, M., Camtepe, S. A., Raddatz, K., Schmidt, A., Albayrak, S.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. In: Proceedings of the 6th International Conference on Malicious and Unwanted Software (MALWARE) (2011)
-
(2011)
Proceedings of the 6th International Conference on Malicious and Unwanted Software (MALWARE)
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S.A.3
Raddatz, K.4
Schmidt, A.5
Albayrak, S.6
-
17
-
-
79961035117
-
Analyzing inter-application communication in Android
-
Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the Annual International Conference on Mobile Systems, Applications, and Services (2011)
-
(2011)
Proceedings of the Annual International Conference on Mobile Systems, Applications, and Services
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
18
-
-
14944340027
-
Identifying cross site scripting vulnerabilities in web applications
-
Di Lucca, G.A., Fasolino, A.R., Mastoianni, M., Tramontana, P.: Identifying cross site scripting vulnerabilities in web applications. In: Proceedings of the 6th IEEE International Workshop on Web Site Evolution (WSE) (2004)
-
(2004)
Proceedings of the 6th IEEE International Workshop on Web Site Evolution (WSE)
-
-
Di Lucca, G.A.1
Fasolino, A.R.2
Mastoianni, M.3
Tramontana, P.4
-
19
-
-
85025700509
-
A study of Android application security
-
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: Proceedings of the 20th USENIX Security Symposium (2011)
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
21
-
-
80755187788
-
Android permissions demystified
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the ACM Conference on Computer and Communications, Security (2011)
-
(2011)
Proceedings of the ACM Conference on Computer and Communications, Security
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
22
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
Felt, A.P., Wang, H., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: Attacks and defenses. In: Proceedings of the 20th USENIX Security Symposium (2011)
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
23
-
-
79955904273
-
-
Technical report, University of Maryland
-
Fuchs, A.P., Chaudhuri, A., Foster, J.S.: SCanDroid: Automated security certification of Android applications. Technical report, University of Maryland (2009)
-
(2009)
SCanDroid: Automated Security Certification of Android Applications
-
-
Fuchs, A.P.1
Chaudhuri, A.2
Foster, J.S.3
-
24
-
-
85165758676
-
Systematic detection of capability leaks in stock Android smartphones
-
Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic detection of capability leaks in stock Android smartphones. In: Proceedings of the 19th Annual Symposium on Network and Distributed System, Security (2012)
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System, Security
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
25
-
-
85084163631
-
No plan survives contact: Experience with cybercrime measurement
-
Kanich, C., Chachra, N., McCoy, D., Grier, C., Wang, D.Y., Motoyama, M., Levchenko, K., Savage, S., Voelker, G.M.: No plan survives contact: Experience with cybercrime measurement. In: Proceedings of the 4th Conference on Cyber Security Experimentation and Test (2011)
-
(2011)
Proceedings of the 4th Conference on Cyber Security Experimentation and Test
-
-
Kanich, C.1
Chachra, N.2
McCoy, D.3
Grier, C.4
Wang, D.Y.5
Motoyama, M.6
Levchenko, K.7
Savage, S.8
Voelker, G.M.9
-
26
-
-
84920514359
-
ScanDal: Static analyzer for detecting privacy leaks in Android applications
-
Kim, J., Yoon, Y., Yi, K., Shin, J., Center, S.: ScanDal: Static analyzer for detecting privacy leaks in Android applications. In: Proceedings of the MoST (2012)
-
(2012)
Proceedings of the MoST
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
Center, S.5
-
27
-
-
33751032654
-
Noxes: A client-side solution for mitigating cross-site scripting attacks
-
Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: A client-side solution for mitigating cross-site scripting attacks. In: Proceedings of the 2006 ACM Symposium on Applied, Computing (2006)
-
(2006)
Proceedings of the 2006 ACM Symposium on Applied, Computing
-
-
Kirda, E.1
Kruegel, C.2
Vigna, G.3
Jovanovic, N.4
-
29
-
-
84862909641
-
Attacks on WebView in the Android system
-
Luo, T., Hao, H., Du, W., Wang, Y., Yin, H.: Attacks on WebView in the Android system. In: Proceedings of the 27th Annual Computer Security Applications Conference (2011)
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
30
-
-
84869428407
-
You are what you include: Large-scale evaluation of remote JavaScript inclusions
-
Nikiforakis, N., Invernizzi, L., Kapravelos, A., Van Acker, S., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: You are what you include: Large-scale evaluation of remote JavaScript inclusions. In: Proceedings of the ACM Conference on Computer and Communications, Security (2012)
-
(2012)
Proceedings of the ACM Conference on Computer and Communications, Security
-
-
Nikiforakis, N.1
Invernizzi, L.2
Kapravelos, A.3
Van Acker, S.4
Joosen, W.5
Kruegel, C.6
Piessens, F.7
Vigna, G.8
-
31
-
-
84901668578
-
-
Dedexer.
-
Paller, G.: Dedexer. http://dedexer.sourceforge.net/
-
-
-
Paller, G.1
-
32
-
-
84871959049
-
AdDroid: Privilege separation for applications and advertisers in Android
-
Pearce, P., Felt, A.P., Nunez, G., Wagner, D.: AdDroid: Privilege separation for applications and advertisers in Android. In: Proceedings of AsiaCCS (2012)
-
(2012)
Proceedings of AsiaCCS
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
35
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on Android
-
Schmidt, A.-D., Bye, R., Schmidt, H.-G., Clausen, J., Kiraz, O., Yuksel, K.A., Camtepe, S.A., Albayrak, S.: Static analysis of executables for collaborative malware detection on Android. In: Proceedings of International Conference on Communications (ICC) (2009)
-
(2009)
Proceedings of International Conference on Communications (ICC)
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.A.6
Camtepe, S.A.7
Albayrak, S.8
-
37
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A first step towards automated detection of buffer overrun vulnerabilities. In: Proceedings of Network and Distributed System Security Symposium (2000)
-
(2000)
Proceedings of Network and Distributed System Security Symposium
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
|