-
1
-
-
84873955433
-
-
[Online]. Available
-
“Android NDK.” [Online]. Available: http://developer.android.com/tools/sdk/ndk/index.html
-
Android NDK
-
-
-
2
-
-
85180624401
-
-
accessed July [Online]. Available
-
“Security Enhancements in Android 4.2,” accessed July 2013. [Online]. Available: https://source.android.com/devices/tech/security/enhancements.html
-
(2013)
Security Enhancements in Android 4.2
-
-
-
3
-
-
85026664998
-
Android library statistics
-
AppBrain, shortened to protect users of the vulnerable framework. [Online]. Available
-
“Android library statistics,” AppBrain, URL shortened to protect users of the vulnerable framework. [Online]. Available: http://www.appbrain.com/stats/libraries
-
-
-
-
4
-
-
85180630626
-
-
iOS Security, Apple, October [Online]. Available
-
iOS Security, Apple, October 2012. [Online]. Available: http://images.apple.com/iphone/business/docs/iOS_Security_Oct12.pdf
-
(2012)
-
-
-
5
-
-
84869388345
-
Pscout: analyzing the android permission specification
-
ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “Pscout: analyzing the android permission specification,” in Proceedings of the ACM Conference on Computer and Communications Security. ACM, 2012, pp. 217–228.
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 217-228
-
-
Au, K. W. Y.1
Zhou, Y. F.2
Huang, Z.3
Lie, D.4
-
7
-
-
0343701135
-
OpenPGP Message Format
-
[Online]. Available
-
J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer, “OpenPGP Message Format,” RFC 4880. [Online]. Available: http://tools.ietf.org/html/rfc4880#section-5.2
-
RFC 4880
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Shaw, D.4
Thayer, R.5
-
8
-
-
78650032454
-
Return-oriented programming without returns
-
ACM
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, “Return-oriented programming without returns,” in Proceedings of the ACM Conference on Computer and Communications Security. ACM, 2010, pp. 559–572.
-
(2010)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
9
-
-
79961035117
-
Analyzing inter-application communication in Android
-
ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, “Analyzing inter-application communication in Android,” in Proceedings of the International Conference on Mobile Systems, Applications, and Services. ACM, 2011, pp. 239–252.
-
(2011)
Proceedings of the International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A. P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck, “Efficiently computing static single assignment form and the control dependence graph,” ACM Transactions on Programming Languages and Systems, vol. 13, no. 4, pp. 451–490, 1991.
-
(1991)
ACM Transactions on Programming Languages and Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B. K.3
Wegman, M. N.4
Zadeck, F. K.5
-
11
-
-
85009372606
-
Apple iOS 4 security evaluation
-
D. A. Dai Zovi, “Apple iOS 4 security evaluation,” Black Hat USA, 2011.
-
(2011)
Black Hat USA
-
-
Dai Zovi, D. A.1
-
12
-
-
84881159901
-
I-arm-droid: A rewriting framework for in-app reference monitors for android applications
-
B. Davis, B. Sanders, A. Khodaverdian, and H. Chen, “I-arm-droid: A rewriting framework for in-app reference monitors for android applications,” Mobile Security Technologies, vol. 2012, 2012.
-
(2012)
Mobile Security Technologies
, vol.2012
-
-
Davis, B.1
Sanders, B.2
Khodaverdian, A.3
Chen, H.4
-
14
-
-
84889010243
-
An empirical study of cryptographic misuse in android applications
-
ACM
-
M. Egele, D. Brumley, Y. Fratantonio, and C. Kruegel, “An empirical study of cryptographic misuse in android applications,” in Proceedings of the ACM Conference on Computer and Communications Security. ACM, 2013, pp. 73–84.
-
(2013)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Egele, M.1
Brumley, D.2
Fratantonio, Y.3
Kruegel, C.4
-
15
-
-
84869487159
-
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
-
ACM
-
S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, and B. Freisleben, “Why Eve and Mallory love Android: An analysis of Android SSL (in) security,” in Proceedings of the ACM Conference on Computer and Communications Security. ACM, 2012, pp. 50–61.
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Baumgärtner, L.5
Freisleben, B.6
-
16
-
-
84899731990
-
-
Google, Inc., accessed July [Online]. Available
-
“Google Play Developer Program Policies,” Google, Inc., accessed July 2013. [Online]. Available: https://play.google.com/about/developer-content-policy.html
-
(2013)
Google Play Developer Program Policies
-
-
-
17
-
-
85165758676
-
Systematic detection of capability leaks in stock Android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang, “Systematic detection of capability leaks in stock Android smartphones,” in Proceedings of the Network and Distributed System Security Symposium, 2012.
-
(2012)
Proceedings of the Network and Distributed System Security Symposium
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
18
-
-
84864334986
-
Riskranker: scalable and accurate zero-day android malware detection
-
ACM
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, “Riskranker: scalable and accurate zero-day android malware detection,” in Proceedings of the International Conference on Mobile Systems, Applications, and Services. ACM, 2012, pp. 281–294.
-
(2012)
Proceedings of the International Conference on Mobile Systems, Applications, and Services
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
19
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
ACM
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, “Unsafe exposure analysis of mobile in-app advertisements,” in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2012, pp. 101–112.
-
(2012)
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks
, pp. 101-112
-
-
Grace, M. C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
20
-
-
84877944138
-
On the effectiveness of API-level access control using bytecode rewriting in Android
-
ACM
-
H. Hao, V. Singh, and W. Du, “On the effectiveness of API-level access control using bytecode rewriting in Android,” in Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, 2013, pp. 25–36.
-
(2013)
Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 25-36
-
-
Hao, H.1
Singh, V.2
Du, W.3
-
21
-
-
84865574920
-
-
[Online]. Available
-
H. Lockheimer, “Android and security.” [Online]. Available: http://googlemobile.blogspot.com/2012/02/android-and-security.html
-
Android and security
-
-
Lockheimer, H.1
-
22
-
-
84869416020
-
Chex: statically vetting android apps for component hijacking vulnerabilities
-
ACM
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, “Chex: statically vetting android apps for component hijacking vulnerabilities,” in Proceedings of the ACM Conference on Computer and Communications Security. ACM, 2012, pp. 229–240.
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
23
-
-
84862909641
-
Attacks on WebView in the Android system
-
ACM
-
T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin, “Attacks on WebView in the Android system,” in Proceedings of the Annual Computer Security Applications Conference. ACM, 2011, pp. 343–352.
-
(2011)
Proceedings of the Annual Computer Security Applications Conference
, pp. 343-352
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
24
-
-
84855746345
-
-
McAfee, [Online]. Available
-
McAfee Threats Report: First Quarter 2013, McAfee, 2013. [Online]. Available: http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2013.pdf
-
(2013)
McAfee Threats Report: First Quarter 2013
-
-
-
29
-
-
85072933898
-
Adapting software fault isolation to contemporary cpu architectures
-
D. Sehr, R. Muth, C. Biffle, V. Khimenko, E. Pasko, K. Schimpf, B. Yee, and B. Chen, “Adapting software fault isolation to contemporary cpu architectures.” in Proceedings of the USENIX Security Symposium, 2010, pp. 1–12.
-
(2010)
Proceedings of the USENIX Security Symposium
, pp. 1-12
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
30
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)
-
ACM
-
H. Shacham, “The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86),” in Proceedings of the ACM Conference on Computer and Communications Security. ACM, 2007, pp. 552–561.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
31
-
-
33748161983
-
Configuring the SELinux policy
-
S. Smalley, “Configuring the SELinux policy,” NAI Labs Rep, pp. 02–007, 2002.
-
(2002)
NAI Labs Rep
, pp. 02-007
-
-
Smalley, S.1
-
33
-
-
2442534092
-
Implementing SELinux as a Linux security module
-
S. Smalley, C. Vance, and W. Salamon, “Implementing SELinux as a Linux security module,” NAI Labs Report, vol. 1, p. 43, 2001.
-
(2001)
NAI Labs Report
, vol.1
, pp. 43
-
-
Smalley, S.1
Vance, C.2
Salamon, W.3
-
36
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
IEEE
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, “Native client: A sandbox for portable, untrusted x86 native code,” in Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 2009, pp. 79–93.
-
(2009)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J. B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
39
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets,” in Proceedings of the Network and Distributed System Security Symposium, 2012.
-
(2012)
Proceedings of the Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|