메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID (OPERATING SYSTEM); ANDROID MALWARE; CODES (SYMBOLS); LOADING; VIRUSES;

EID: 84961583949     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23328     Document Type: Conference Paper
Times cited : (224)

References (39)
  • 1
    • 84873955433 scopus 로고    scopus 로고
    • [Online]. Available
    • “Android NDK.” [Online]. Available: http://developer.android.com/tools/sdk/ndk/index.html
    • Android NDK
  • 2
    • 85180624401 scopus 로고    scopus 로고
    • accessed July [Online]. Available
    • “Security Enhancements in Android 4.2,” accessed July 2013. [Online]. Available: https://source.android.com/devices/tech/security/enhancements.html
    • (2013) Security Enhancements in Android 4.2
  • 3
    • 85026664998 scopus 로고    scopus 로고
    • Android library statistics
    • AppBrain, shortened to protect users of the vulnerable framework. [Online]. Available
    • “Android library statistics,” AppBrain, URL shortened to protect users of the vulnerable framework. [Online]. Available: http://www.appbrain.com/stats/libraries
  • 4
    • 85180630626 scopus 로고    scopus 로고
    • iOS Security, Apple, October [Online]. Available
    • iOS Security, Apple, October 2012. [Online]. Available: http://images.apple.com/iphone/business/docs/iOS_Security_Oct12.pdf
    • (2012)
  • 11
    • 85009372606 scopus 로고    scopus 로고
    • Apple iOS 4 security evaluation
    • D. A. Dai Zovi, “Apple iOS 4 security evaluation,” Black Hat USA, 2011.
    • (2011) Black Hat USA
    • Dai Zovi, D. A.1
  • 12
    • 84881159901 scopus 로고    scopus 로고
    • I-arm-droid: A rewriting framework for in-app reference monitors for android applications
    • B. Davis, B. Sanders, A. Khodaverdian, and H. Chen, “I-arm-droid: A rewriting framework for in-app reference monitors for android applications,” Mobile Security Technologies, vol. 2012, 2012.
    • (2012) Mobile Security Technologies , vol.2012
    • Davis, B.1    Sanders, B.2    Khodaverdian, A.3    Chen, H.4
  • 16
    • 84899731990 scopus 로고    scopus 로고
    • Google, Inc., accessed July [Online]. Available
    • “Google Play Developer Program Policies,” Google, Inc., accessed July 2013. [Online]. Available: https://play.google.com/about/developer-content-policy.html
    • (2013) Google Play Developer Program Policies
  • 21
    • 84865574920 scopus 로고    scopus 로고
    • [Online]. Available
    • H. Lockheimer, “Android and security.” [Online]. Available: http://googlemobile.blogspot.com/2012/02/android-and-security.html
    • Android and security
    • Lockheimer, H.1
  • 24
    • 84855746345 scopus 로고    scopus 로고
    • McAfee, [Online]. Available
    • McAfee Threats Report: First Quarter 2013, McAfee, 2013. [Online]. Available: http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2013.pdf
    • (2013) McAfee Threats Report: First Quarter 2013
  • 30
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)
    • ACM
    • H. Shacham, “The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86),” in Proceedings of the ACM Conference on Computer and Communications Security. ACM, 2007, pp. 552–561.
    • (2007) Proceedings of the ACM Conference on Computer and Communications Security , pp. 552-561
    • Shacham, H.1
  • 31
    • 33748161983 scopus 로고    scopus 로고
    • Configuring the SELinux policy
    • S. Smalley, “Configuring the SELinux policy,” NAI Labs Rep, pp. 02–007, 2002.
    • (2002) NAI Labs Rep , pp. 02-007
    • Smalley, S.1
  • 33
    • 2442534092 scopus 로고    scopus 로고
    • Implementing SELinux as a Linux security module
    • S. Smalley, C. Vance, and W. Salamon, “Implementing SELinux as a Linux security module,” NAI Labs Report, vol. 1, p. 43, 2001.
    • (2001) NAI Labs Report , vol.1 , pp. 43
    • Smalley, S.1    Vance, C.2    Salamon, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.