메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Short: Danger is my middle name - Experimenting with SSL vulnerabilities in android apps

Author keywords

Android security; Information leakage; Privacy

Indexed keywords


EID: 84962014059     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2766498.2766522     Document Type: Conference Paper
Times cited : (48)

References (34)
  • 1
    • 84962011580 scopus 로고    scopus 로고
    • Android Advertising ID. https://developer.android.com/google/play-services/id.html.
    • Android Advertising ID
  • 2
    • 84962002818 scopus 로고    scopus 로고
    • AndroidRank. http://www.androidrank.org/.
  • 3
    • 84962011572 scopus 로고    scopus 로고
    • dex2jar. https://code.google.com/p/dex2jar/.
    • Dex2jar
  • 4
    • 84962002811 scopus 로고    scopus 로고
    • Fiddler. http://www.telerik.com/fiddler.
    • Fiddler
  • 5
    • 84961997005 scopus 로고    scopus 로고
    • Java decompiler. http://jd.benow.ca/.
  • 6
    • 84961997026 scopus 로고    scopus 로고
    • Wireshark. https://www.wireshark.org/.
  • 7
    • 85002862540 scopus 로고    scopus 로고
    • Alice in warningland: A large-scale field study of browser security warning effectiveness
    • D. Akhawe and A. P. Felt. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In USENIX Security, 2013.
    • (2013) USENIX Security
    • Akhawe, D.1    Felt, A.P.2
  • 8
    • 84881253685 scopus 로고    scopus 로고
    • Measuring SSL indicators on mobile browsers: Extended life, or end of the road?
    • C. Amrutkar, P. Traynor, and P. C. van Oorschot. Measuring SSL indicators on mobile browsers: extended life, or end of the road? In ISC, 2012.
    • (2012) ISC
    • Amrutkar, C.1    Traynor, P.2    Van Oorschot, P.C.3
  • 9
    • 84869388345 scopus 로고    scopus 로고
    • Pscout: Analyzing the android permission specification
    • K. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: analyzing the android permission specification. In CCS, 2012.
    • (2012) CCS
    • Au, K.1    Zhou, Y.F.2    Huang, Z.3    Lie, D.4
  • 10
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for Empirical Analysis of Permission-based Security Models and Its Application to Android. In CCS, 2010.
    • (2010) CCS
    • Barrera, D.1    Kayacik, H.G.2    Van Oorschot, P.C.3    Somayaji, A.4
  • 12
    • 84914109052 scopus 로고    scopus 로고
    • Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations
    • C. Brubaker, S. Jana, B. Ray, S. Khurshid, and V. Shmatikov. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. In S&P, 2014.
    • (2014) S&P
    • Brubaker, C.1    Jana, S.2    Ray, B.3    Khurshid, S.4    Shmatikov, V.5
  • 14
    • 84910657043 scopus 로고    scopus 로고
    • Mithys: Mind the hand you shake-protecting mobile devices from SSL usage vulnerabilities
    • M. Conti, N. Dragoni, and S. Gottardo. Mithys: Mind the Hand you Shake-Protecting Mobile Devices from SSL Usage Vulnerabilities. In STM, 2013.
    • (2013) STM
    • Conti, M.1    Dragoni, N.2    Gottardo, S.3
  • 17
    • 84889010243 scopus 로고    scopus 로고
    • An empirical study of cryptographic misuse in android applications
    • M. Egele, D. Brumley, Y. Fratantonio, and C. Kruegel. An Empirical Study of Cryptographic Misuse in Android Applications. In CCS, 2013.
    • (2013) CCS
    • Egele, M.1    Brumley, D.2    Fratantonio, Y.3    Kruegel, C.4
  • 18
    • 84897681073 scopus 로고    scopus 로고
    • TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones. CACM, 57(3), 2014.
    • (2014) CACM , vol.57 , Issue.3
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 21
    • 84951034076 scopus 로고    scopus 로고
    • Improving SSL warnings: Comprehension and adherence
    • A. P. Felt et al. Improving SSL Warnings: Comprehension and Adherence. In CHI, 2015.
    • (2015) CHI
    • Felt, A.P.1
  • 23
    • 84869429339 scopus 로고    scopus 로고
    • The most dangerous code in the world: Validating SSL certificates in non-browser software
    • M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software. In CCS, 2012.
    • (2012) CCS
    • Georgiev, M.1    Iyengar, S.2    Jana, S.3    Anubhai, R.4    Boneh, D.5    Shmatikov, V.6
  • 25
    • 85180551265 scopus 로고    scopus 로고
    • Upgrading https in mid-air: An empirical study of strict transport security and key pinning
    • M. Kranch and J. Bonneau. Upgrading https in mid-air: An empirical study of strict transport security and key pinning. In NDSS, 2015.
    • (2015) NDSS
    • Kranch, M.1    Bonneau, J.2
  • 26
    • 84984889445 scopus 로고    scopus 로고
    • ConXsense: Automated context classification for context-aware access control
    • M. Miettinen, S. Heuser, W. Kronz, A.-R. Sadeghi, and N. Asokan. ConXsense: Automated Context Classification for Context-aware Access Control. In ASIACCS, 2014.
    • (2014) ASIACCS
    • Miettinen, M.1    Heuser, S.2    Kronz, W.3    Sadeghi, A.-R.4    Asokan, N.5
  • 28
    • 85180622320 scopus 로고    scopus 로고
    • SMV-HUNTER: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in android apps
    • D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, and L. Khan. SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. In NDSS, 2014.
    • (2014) NDSS
    • Sounthiraraj, D.1    Sahs, J.2    Greenwood, G.3    Lin, Z.4    Khan, L.5
  • 29
    • 84869401890 scopus 로고    scopus 로고
    • The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems
    • S.-T. Sun and K. Beznosov. The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. In CCS, 2012.
    • (2012) CCS
    • Sun, S.-T.1    Beznosov, K.2
  • 32
    • 84869035513 scopus 로고    scopus 로고
    • Malicious android applications in the enterprise: What do they do and how do we fix it?
    • X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos. Malicious Android applications in the enterprise: What do they do and how do we fix it? In Data Engineering Workshops, 2012.
    • (2012) Data Engineering Workshops
    • Wei, X.1    Gomez, L.2    Neamtiu, I.3    Faloutsos, M.4
  • 33
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS, 2012.
    • (2012) NDSS
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4
  • 34
    • 84872325256 scopus 로고    scopus 로고
    • Taming information-stealing smartphone applications (on android)
    • Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming information-stealing smartphone applications (on android). In TRUST, 2011.
    • (2011) TRUST
    • Zhou, Y.1    Zhang, X.2    Jiang, X.3    Freeh, V.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.