-
2
-
-
84964826539
-
-
http://onlinepresent.org/proceedings/vol35-2013/13.pdf.
-
-
-
-
3
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. schechter, and D. Wetherall, "These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications, "in Proceedings of the 18th ACM Conference on Computer and Communications.
-
Proceedings of the 18th ACM Conference on Computer and Communications
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
4
-
-
84964851700
-
-
Google, Android Security and Permissions
-
Google, Android Security and Permissions, 2013.(http://d.android.com/guide/topics/security.html).
-
(2013)
-
-
-
5
-
-
77954528100
-
-
Google
-
Google, Android Home Page, 2009. (http://www. Android.com).
-
(2009)
Android Home Page
-
-
-
6
-
-
84905080582
-
Using static analysis on android applications to identify private information leaks
-
K. Luo, "Using static analysis on android applications to identify private information leaks, " Master Dissertation of Kansas State University, 2011.
-
(2011)
Master Dissertation of Kansas State University
-
-
Luo, K.1
-
7
-
-
84964905421
-
-
DED Decompiler
-
D. Octeau, W. Enck, and P. McDaniel, the DED Decompiler, 2011. (http://siis. cse. psu. edu/ded/papers/NAS-TR-0140-2010.pdf).
-
(2011)
-
-
Octeau, D.1
Enck, W.2
McDaniel, P.3
-
8
-
-
85062539969
-
Android malicious behavior detection based on sensitive api monitoring
-
Nov
-
Q. Qian, J. Cai, and R. Zhang, "Android malicious behavior detection based on sensitive api monitoring, "in 2nd International Workshop on Security, pp. 54-57, Nov. 2013.
-
(2013)
2nd International Workshop on Security
, pp. 54-57
-
-
Qian, Q.1
Cai, J.2
Zhang, R.3
-
9
-
-
79961035117
-
Analyzing inter-application communication in android
-
Washington, USA, June
-
E. Chin, A.P. Felt, K. Greenwood, and D. Wagner, "Analyzing inter-application communication in android, "in Proceedings of the 9th International Conference on Mobile Systems, Applications and Service, pp. 239-252, Washington, USA, June 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications and Service
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
74049155830
-
On lightweight mobile phone application certification
-
Chicago, USA, Nov
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification, "in Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235-245, Chicago, USA, Nov. 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
11
-
-
84964872431
-
-
Google, Dex2jar: Tools to Work with Android.dex and Java.classes
-
Google, Dex2jar: Tools to Work with Android.dex and java.classes, 2013. (http://code. google. com/p/dex2jar/).
-
(2013)
-
-
-
12
-
-
85058873694
-
Freemarket: Shopping for free in android applications
-
Hilton San Diego, USA,Feb
-
D. Reynaud, D. Song, T. Magrino, E. Wu, and R. Shin, "Freemarket: shopping for free in android applications, " in 19th Annual Network & Distributed System Security Symposium, Hilton San Diego, USA,Feb. 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium
-
-
Reynaud, D.1
Song, D.2
Magrino, T.3
Wu, E.4
Shin, R.5
|