-
3
-
-
84943159826
-
Iccta: Detecting inter-component privacy leaks in android apps
-
ICSE '15 IEEE Press Piscataway, NJ, USA
-
L. Li, A. Bartel, T.F. Bissyandé, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, and P. McDaniel Iccta: Detecting inter-component privacy leaks in android apps Proceedings of the 37th International Conference on Software Engineering - Volume 1 ICSE '15 2015 IEEE Press Piscataway, NJ, USA 280 291
-
(2015)
Proceedings of the 37th International Conference on Software Engineering - Volume 1
, pp. 280-291
-
-
Li, L.1
Bartel, A.2
Bissyandé, T.F.3
Klein, J.4
Le Traon, Y.5
Arzt, S.6
Rasthofer, S.7
Bodden, E.8
Octeau, D.9
McDaniel, P.10
-
4
-
-
80755181021
-
A survey of mobile malware in the wild
-
SPSM '11 ACM New York, USA
-
A.P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner A survey of mobile malware in the wild Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices SPSM '11 2011 ACM New York, USA 3 14
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
5
-
-
80755187788
-
Android permissions demystified
-
CCS '11 ACM New York, USA
-
A.P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner Android permissions demystified Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11 2011 ACM New York, USA 627 638
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
6
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
CCS '11 ACM New York, USA
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11 2011 ACM New York, USA 639 652
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
7
-
-
84889041424
-
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
-
CCS '13 ACM New York, USA
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X.S. Wang Appintent: Analyzing sensitive data transmission in android for privacy leakage detection Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security CCS '13 2013 ACM New York, USA 1043 1054
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1043-1054
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
8
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps SIGPLAN Not. 49 6 2014 259 269
-
(2014)
SIGPLAN Not.
, vol.49
, Issue.6
, pp. 259-269
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
10
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
OSDI'10 USENIX Association Berkeley, CA, USA
-
W. Enck, P. Gilbert, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N. Sheth Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation OSDI'10 2010 USENIX Association Berkeley, CA, USA 1 6
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
11
-
-
84873675066
-
Leakminer: Detect information leakage on android with static taint analysis
-
WCSE '12 IEEE Computer Society Washington, DC, USA
-
Z. Yang, and M. Yang Leakminer: Detect information leakage on android with static taint analysis Proceedings of the 2012 Third World Congress on Software Engineering WCSE '12 2012 IEEE Computer Society Washington, DC, USA 101 104
-
(2012)
Proceedings of the 2012 Third World Congress on Software Engineering
, pp. 101-104
-
-
Yang, Z.1
Yang, M.2
-
12
-
-
84984918811
-
Efficient, context-aware privacy leakage confinement for android applications without firmware modding
-
ASIA CCS '14 ACM New York, USA
-
M. Zhang, and H. Yin Efficient, context-aware privacy leakage confinement for android applications without firmware modding Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security ASIA CCS '14 2014 ACM New York, USA 259 270
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
, pp. 259-270
-
-
Zhang, M.1
Yin, H.2
-
13
-
-
78650024495
-
Accessminer: Using system-centric models for malware protection
-
CCS '10 ACM New York, USA
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda Accessminer: Using system-centric models for malware protection Proceedings of the 17th ACM Conference on Computer and Communications Security CCS '10 2010 ACM New York, USA 399 412
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 399-412
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
15
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
CCS '12 ACM New York, USA
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy Using probabilistic generative models for ranking risks of android apps Proceedings of the 2012 ACM Conference on Computer and Communications Security CCS '12 2012 ACM New York, USA 241 252
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
16
-
-
85025148063
-
Droidapiminer: Mining api-level features for robust malware detection in android
-
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer International Publishing
-
Y. Aafer, W. Du, and H. Yin Droidapiminer: Mining api-level features for robust malware detection in android Security and Privacy in Communication Networks Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 127 2013 Springer International Publishing 86 103
-
(2013)
Security and Privacy in Communication Networks
, vol.127
, pp. 86-103
-
-
Aafer, Y.1
Du, W.2
Yin, H.3
-
17
-
-
85178287263
-
Drebin: Effective and explainable detection of android malware in your pocket
-
NDSS'14
-
D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, K. Rieck, and C. Siemens Drebin: Effective and explainable detection of android malware in your pocket Proceedings of the Annual Symposium on Network and Distributed System Security NDSS'14 2014
-
(2014)
Proceedings of the Annual Symposium on Network and Distributed System Security
-
-
Arp, D.1
Spreitzenbarth, M.2
Hübner, M.3
Gascon, H.4
Rieck, K.5
Siemens, C.6
-
18
-
-
84923250812
-
Profiling user-trigger dependence for android malware detection
-
K.O. Elish, X. Shu, D.D. Yao, B.G. Ryder, and X. Jiang Profiling user-trigger dependence for android malware detection Computers & Security 49 0 2015 255 273
-
(2015)
Computers & Security
, vol.49
, pp. 255-273
-
-
Elish, K.O.1
Shu, X.2
Yao, D.D.3
Ryder, B.G.4
Jiang, X.5
-
19
-
-
84887475095
-
Instrumenting android and java applications as easy as abc
-
Lecture Notes in Computer Science Springer Berlin Heidelberg
-
S. Arzt, S. Rasthofer, and E. Bodden Instrumenting android and java applications as easy as abc Runtime Verification Lecture Notes in Computer Science 8174 2013 Springer Berlin Heidelberg 364 381
-
(2013)
Runtime Verification
, vol.8174
, pp. 364-381
-
-
Arzt, S.1
Rasthofer, S.2
Bodden, E.3
-
21
-
-
84863492870
-
Dexpler: Converting android dalvik bytecode to jimple for static analysis with soot
-
SOAP '12 ACM New York, USA
-
A. Bartel, J. Klein, Y. Le Traon, and M. Monperrus Dexpler: Converting android dalvik bytecode to jimple for static analysis with soot Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis SOAP '12 2012 ACM New York, USA 27 38
-
(2012)
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis
, pp. 27-38
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
22
-
-
85025700509
-
A study of android application security
-
SEC'11 USENIX Association Berkeley, CA, USA 21-21
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri A study of android application security Proceedings of the 20th USENIX Conference on Security SEC'11 2011 USENIX Association Berkeley, CA, USA 21-21
-
(2011)
Proceedings of the 20th USENIX Conference on Security
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
23
-
-
0025725905
-
Instance-based learning algorithms
-
D. Aha, D. Kibler, and M. Albert Instance-based learning algorithms Mach. Learn. 6 1 1991 37 66
-
(1991)
Mach. Learn.
, vol.6
, Issue.1
, pp. 37-66
-
-
Aha, D.1
Kibler, D.2
Albert, M.3
-
26
-
-
84961624895
-
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks
-
S.R. Steven Arzt, and E. Bodden SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks EC SPRIDE Technical Report TUD-CS-2013-0114 2013
-
(2013)
EC SPRIDE Technical Report TUD-CS-2013-0114
-
-
Steven Arzt, S.R.1
Bodden, E.2
-
27
-
-
84961581598
-
-
Android.spy.49 (ibanking)
-
Android.spy.49 (ibanking), 2014, URL http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3166.
-
(2014)
-
-
-
30
-
-
84861556186
-
Evaluating prediction systems in software project estimation
-
M. Shepperd, and S. MacDonell Evaluating prediction systems in software project estimation Inform. Software Tech. 54 8 2012 820 827
-
(2012)
Inform. Software Tech.
, vol.54
, Issue.8
, pp. 820-827
-
-
Shepperd, M.1
Macdonell, S.2
|