-
1
-
-
79961035117
-
Analyzing inter-application communication in android
-
E. Chin, A. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pages 239-252, 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A.2
Greenwood, K.3
Wagner, D.4
-
2
-
-
79961035117
-
Analyzing inter-application communication in android
-
E. Chin, A. F. Porter, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pages 239-252, 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Porter, A.F.2
Greenwood, K.3
Wagner, D.4
-
3
-
-
84883480901
-
Improving the security of android inter-component communication
-
A. Cozzette, K. Lingel, S. Matsumoto, O. Ortlieb, J. Alexander, J. Betser, L. Florer, G. Kuenning, J. Nilles, and P. L. Reiher. Improving the security of android inter-component communication. In IM, pages 808-811, 2013.
-
(2013)
IM
, pp. 808-811
-
-
Cozzette, A.1
Lingel, K.2
Matsumoto, S.3
Ortlieb, O.4
Alexander, J.5
Betser, J.6
Florer, L.7
Kuenning, G.8
Nilles, J.9
Reiher, P.L.10
-
4
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pages 1-6, 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
5
-
-
60049085302
-
Understanding android security
-
W. Enck, M. Ongtang, and P. McDaniel. Understanding android security. IEEE Security and Privacy, 7(1):50-57, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
8
-
-
84869786248
-
Reducing attack surfaces for intra-application communication in android
-
D. Kantola, E. Chin, W. He, and D. Wagner. Reducing attack surfaces for intra-application communication in android. In SPSM, pages 69-80, 2012.
-
(2012)
SPSM
, pp. 69-80
-
-
Kantola, D.1
Chin, E.2
He, W.3
Wagner, D.4
-
9
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: Statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, pages 229-240.
-
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
10
-
-
84862909641
-
Attacks on webview in the android system
-
T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin. Attacks on webview in the android system. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 343-352, 2011.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference
, pp. 343-352
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
11
-
-
84866647320
-
An empirical study of the robustness of inter-component communication in android
-
A. K. Maji, F. A. Arshad, S. Bagchi, and J. S. Rellermeyer. An empirical study of the robustness of inter-component communication in android. In DSN, pages 1-12, 2012.
-
(2012)
DSN
, pp. 1-12
-
-
Maji, A.K.1
Arshad, F.A.2
Bagchi, S.3
Rellermeyer, J.S.4
-
13
-
-
85075955161
-
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In Proceedings of the 22Nd USENIX Conference on Security, pages 543-558, 2013.
-
(2013)
Proceedings of the 22Nd USENIX Conference on Security
, pp. 543-558
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Traon, Y.L.7
-
14
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: Versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, pages 347-356, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
15
-
-
84920622630
-
Droidforce: Enforcing complex, data-centric, system-wide policies in android
-
S. Rasthofer, S. Arzt, E. Lovat, and E. Bodden. Droidforce: Enforcing complex, data-centric, system-wide policies in android. In Proceedings of the 9th International Conference on Availability, Reliability and Security (ARES), 2014.
-
(2014)
Proceedings of the 9th International Conference on Availability, Reliability and Security (ARES)
-
-
Rasthofer, S.1
Arzt, S.2
Lovat, E.3
Bodden, E.4
-
17
-
-
0030263395
-
Precise interprocedural dataow analysis with applications to constant propagation
-
M. Sagiv, T. Reps, and S. Horwitz. Precise interprocedural dataow analysis with applications to constant propagation. In Theor. Comput. Sci., pages 131-170, 1996.
-
(1996)
Theor. Comput. Sci
, pp. 131-170
-
-
Sagiv, M.1
Reps, T.2
Horwitz, S.3
-
19
-
-
84942766188
-
Verifying atomicity via data independence
-
O. Shacham, E. Yahav, G. G. Gueta, A. Aiken, N. Bronson, M. Sagiv, and M. Vechev. Verifying atomicity via data independence. In Proceedings of the 2014 International Symposium on Software Testing and Analysis, pages 26-36, 2014.
-
(2014)
Proceedings of the 2014 International Symposium on Software Testing and Analysis
, pp. 26-36
-
-
Shacham, O.1
Yahav, E.2
Gueta, G.G.3
Aiken, A.4
Bronson, N.5
Sagiv, M.6
Vechev, M.7
-
22
-
-
84984865297
-
Intentfuzzer: Detecting capability leaks of android applications
-
K. Yang, J. Zhuge, Y. Wang, L. Zhou, and H. Duan. Intentfuzzer: Detecting capability leaks of android applications. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pages 531-536, 2014.
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
, pp. 531-536
-
-
Yang, K.1
Zhuge, J.2
Wang, Y.3
Zhou, L.4
Duan, H.5
-
23
-
-
84897650529
-
Droidfuzzer: Fuzzing the android apps with intent-filter tag
-
H. Ye, S. Cheng, L. Zhang, and F. Jiang. Droidfuzzer: Fuzzing the android apps with intent-filter tag. In Proceedings of International Conference on Advances in Mobile Computing and Multimedia, pages 68:68-68:74, 2013.
-
(2013)
Proceedings of International Conference on Advances in Mobile Computing and Multimedia
, pp. 6868-6874
-
-
Ye, H.1
Cheng, S.2
Zhang, L.3
Jiang, F.4
|