-
1
-
-
84962011580
-
-
Android Advertising ID. https://developer.android.com/google/play-services/id.html.
-
Android Advertising ID
-
-
-
2
-
-
84962002818
-
-
AndroidRank. http://www.androidrank.org/.
-
-
-
-
3
-
-
84962011572
-
-
dex2jar. https://code.google.com/p/dex2jar/.
-
Dex2jar
-
-
-
4
-
-
84962002811
-
-
Fiddler. http://www.telerik.com/fiddler.
-
Fiddler
-
-
-
5
-
-
84961997005
-
-
Java decompiler. http://jd.benow.ca/.
-
-
-
-
6
-
-
84961997026
-
-
Wireshark. https://www.wireshark.org/.
-
-
-
-
7
-
-
85002862540
-
Alice in warningland: A large-scale field study of browser security warning effectiveness
-
D. Akhawe and A. P. Felt. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Akhawe, D.1
Felt, A.P.2
-
8
-
-
84881253685
-
Measuring SSL indicators on mobile browsers: Extended life, or end of the road?
-
C. Amrutkar, P. Traynor, and P. C. van Oorschot. Measuring SSL indicators on mobile browsers: extended life, or end of the road? In ISC, 2012.
-
(2012)
ISC
-
-
Amrutkar, C.1
Traynor, P.2
Van Oorschot, P.C.3
-
9
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
K. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: analyzing the android permission specification. In CCS, 2012.
-
(2012)
CCS
-
-
Au, K.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
10
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for Empirical Analysis of Permission-based Security Models and Its Application to Android. In CCS, 2010.
-
(2010)
CCS
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
11
-
-
84910629417
-
Securing SSL certificate verification through dynamic linking
-
A. Bates, J. Pletcher, T. Nichols, B. Hollembaek, D. Tian, K. R. Butler, and A. Alkhelaifi. Securing SSL Certificate Verification through Dynamic Linking. In CCS, 2014.
-
(2014)
CCS
-
-
Bates, A.1
Pletcher, J.2
Nichols, T.3
Hollembaek, B.4
Tian, D.5
Butler, K.R.6
Alkhelaifi, A.7
-
12
-
-
84914109052
-
Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations
-
C. Brubaker, S. Jana, B. Ray, S. Khurshid, and V. Shmatikov. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. In S&P, 2014.
-
(2014)
S&P
-
-
Brubaker, C.1
Jana, S.2
Ray, B.3
Khurshid, S.4
Shmatikov, V.5
-
13
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards Taming Privilege-Escalation Attacks on Android. In NDSS, 2012.
-
(2012)
NDSS
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
14
-
-
84910657043
-
Mithys: Mind the hand you shake-protecting mobile devices from SSL usage vulnerabilities
-
M. Conti, N. Dragoni, and S. Gottardo. Mithys: Mind the Hand you Shake-Protecting Mobile Devices from SSL Usage Vulnerabilities. In STM, 2013.
-
(2013)
STM
-
-
Conti, M.1
Dragoni, N.2
Gottardo, S.3
-
15
-
-
85133463240
-
The tangled web of password reuse
-
A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang. The Tangled Web of Password Reuse. In NDSS, 2014.
-
(2014)
NDSS
-
-
Das, A.1
Bonneau, J.2
Caesar, M.3
Borisov, N.4
Wang, X.5
-
17
-
-
84889010243
-
An empirical study of cryptographic misuse in android applications
-
M. Egele, D. Brumley, Y. Fratantonio, and C. Kruegel. An Empirical Study of Cryptographic Misuse in Android Applications. In CCS, 2013.
-
(2013)
CCS
-
-
Egele, M.1
Brumley, D.2
Fratantonio, Y.3
Kruegel, C.4
-
18
-
-
84897681073
-
TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones. CACM, 57(3), 2014.
-
(2014)
CACM
, vol.57
, Issue.3
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
19
-
-
84869487159
-
Why Eve and mallory love android: An analysis of android SSL (in)security
-
S. Fahl, M. Harbach, T. Muders, L. Baumgärtner, B. Freisleben, and M. Smith. Why Eve and Mallory love Android: An analysis of Android SSL (in)security. In CCS, 2012.
-
(2012)
CCS
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
20
-
-
84889022608
-
Rethinking SSL development in an appified world
-
S. Fahl, M. Harbach, H. Perl, M. Koetter, and M. Smith. Rethinking SSL Development in an Appified World. In CCS, 2013.
-
(2013)
CCS
-
-
Fahl, S.1
Harbach, M.2
Perl, H.3
Koetter, M.4
Smith, M.5
-
21
-
-
84951034076
-
Improving SSL warnings: Comprehension and adherence
-
A. P. Felt et al. Improving SSL Warnings: Comprehension and Adherence. In CHI, 2015.
-
(2015)
CHI
-
-
Felt, A.P.1
-
23
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software. In CCS, 2012.
-
(2012)
CCS
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
25
-
-
85180551265
-
Upgrading https in mid-air: An empirical study of strict transport security and key pinning
-
M. Kranch and J. Bonneau. Upgrading https in mid-air: An empirical study of strict transport security and key pinning. In NDSS, 2015.
-
(2015)
NDSS
-
-
Kranch, M.1
Bonneau, J.2
-
26
-
-
84984889445
-
ConXsense: Automated context classification for context-aware access control
-
M. Miettinen, S. Heuser, W. Kronz, A.-R. Sadeghi, and N. Asokan. ConXsense: Automated Context Classification for Context-aware Access Control. In ASIACCS, 2014.
-
(2014)
ASIACCS
-
-
Miettinen, M.1
Heuser, S.2
Kronz, W.3
Sadeghi, A.-R.4
Asokan, N.5
-
28
-
-
85180622320
-
SMV-HUNTER: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in android apps
-
D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, and L. Khan. SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. In NDSS, 2014.
-
(2014)
NDSS
-
-
Sounthiraraj, D.1
Sahs, J.2
Greenwood, G.3
Lin, Z.4
Khan, L.5
-
29
-
-
84869401890
-
The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems
-
S.-T. Sun and K. Beznosov. The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. In CCS, 2012.
-
(2012)
CCS
-
-
Sun, S.-T.1
Beznosov, K.2
-
30
-
-
84926351578
-
Crying Wolf: An empirical study of SSL warning effectiveness
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
32
-
-
84869035513
-
Malicious android applications in the enterprise: What do they do and how do we fix it?
-
X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos. Malicious Android applications in the enterprise: What do they do and how do we fix it? In Data Engineering Workshops, 2012.
-
(2012)
Data Engineering Workshops
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
33
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS, 2012.
-
(2012)
NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
34
-
-
84872325256
-
Taming information-stealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming information-stealing smartphone applications (on android). In TRUST, 2011.
-
(2011)
TRUST
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|