-
1
-
-
85013488162
-
-
I. D. Corporation, 2015-05
-
I. D. Corporation, "Smartphone os market share, q1 2015, " http://www. idc. com/prodserv/smartphone-os-market-share. jsp, 2015-05.
-
Smartphone Os Market Share, q1 2015
-
-
-
2
-
-
84969936139
-
-
2015-03-28
-
Android, "Android sensor overview, " http://developer. Android. com/ guide/topics/sensors/sensors overview. html, 2015-03-28.
-
Android Sensor Overview
-
-
-
4
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith, "Practicality of accelerometer side channels on smartphones, " in Proceedings of the 28th Annual Computer Security Applications Conference. ACM, 2012, pp. 41-50.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference. ACM
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
6
-
-
84860679345
-
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
-
Z. Xu, K. Bai, and S. Zhu, "Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors, " in Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2012, pp. 113-124.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM
, pp. 113-124
-
-
Xu, Z.1
Bai, K.2
Zhu, S.3
-
7
-
-
84969939571
-
-
eSecurity Planet, 2012-04-23
-
eSecurity Planet, "Penn state, ibm researchers develop taplogger android trojan, " http://www. esecurityplanet. com/mobile-security/ penn-state-ibm-researchers-develop-taplogger-android-trojan. html, 2012-04-23.
-
Penn State, IBM Researchers Develop Taplogger Android Trojan
-
-
-
9
-
-
84877622605
-
Sensec: Mobile security through passive sensing
-
J. Zhu, P. Wu, X. Wang, and J. Zhang, "Sensec: Mobile security through passive sensing, " in Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 2013, pp. 1128-1133.
-
(2013)
Computing, Networking and Communications (ICNC), 2013 International Conference On. IEEE
, pp. 1128-1133
-
-
Zhu, J.1
Wu, P.2
Wang, X.3
Zhang, J.4
-
11
-
-
84964873045
-
-
2015-05-23
-
AppBrain, "Google play stats, " http://www. Appbrain. com/stats/, 2015-05-23.
-
Google Play Stats
-
-
-
12
-
-
84970039768
-
-
2015-03-29
-
Android, "Android sensor type, " http://developer. Android. com/reference/ android/hardware/Sensor. html, 2015-03-29.
-
Android Sensor Type
-
-
-
13
-
-
84969925832
-
-
Apktool, 2015-05-20
-
Apktool, "Apktool, " http://ibotpeaches. github. io/Apktool/, 2015-05-20.
-
-
-
-
14
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, "A density-based algorithm for discovering clusters in large spatial databases with noise. " in Kdd, vol. 96, 1996, pp. 226-231.
-
(1996)
Kdd
, vol.96
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
15
-
-
77954692432
-
Comparing stars: On approximating graph edit distance
-
Z. Zeng, A. K. H. Tung, J. Wang, J. Feng, and L. Zhou, "Comparing Stars: On Approximating Graph Edit Distance, " Proceedings of The Vldb Endowment, vol. 2, pp. 25-36, 2009.
-
(2009)
Proceedings of the Vldb Endowment
, vol.2
, pp. 25-36
-
-
Zeng, Z.1
Tung, A.K.H.2
Wang, J.3
Feng, J.4
Zhou, L.5
-
17
-
-
84969947200
-
-
WIKI, "Dbscan, " http://en. wikipedia. org/wiki/DBSCAN, 2015-04-05.
-
Dbscan
-
-
-
19
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel, "Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, " in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, 2014, p. 29.
-
(2014)
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM
, pp. 29
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
20
-
-
84969977692
-
-
Soot, 2015-03-30
-
Soot, "Soot, " http://sable. github. io/soot/, 2015-03-30.
-
-
-
-
21
-
-
84954482087
-
Android taint flow analysis for app sets
-
W. Klieber, L. Flynn, A. Bhosale, L. Jia, and L. Bauer, "Android taint flow analysis for app sets, " in Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis. ACM, 2014, pp. 1-6.
-
(2014)
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis. ACM
, pp. 1-6
-
-
Klieber, W.1
Flynn, L.2
Bhosale, A.3
Jia, L.4
Bauer, L.5
-
22
-
-
85075955161
-
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon, "Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis, " in Proceedings of the 22nd USENIX Security Symposium. Citeseer, 2013.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium. Citeseer
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Le Traon, Y.7
-
23
-
-
84910617173
-
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
-
F. Wei, S. Roy, X. Ou et al., "Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps, " in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014, pp. 1329-1341.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM
, pp. 1329-1341
-
-
Wei, F.1
Roy, S.2
Ou, X.3
-
24
-
-
84877942991
-
Slicing droids: Program slicing for smali code
-
J. Hoffmann, M. Ussath, T. Holz, and M. Spreitzenbarth, "Slicing droids: program slicing for smali code, " in Proceedings of the 28th Annual ACM Symposium on Applied Computing. ACM, 2013, pp. 1844-1851.
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing. ACM
, pp. 1844-1851
-
-
Hoffmann, J.1
Ussath, M.2
Holz, T.3
Spreitzenbarth, M.4
-
25
-
-
84889046959
-
Structural detection of android malware using embedded call graphs
-
H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, "Structural detection of android malware using embedded call graphs, " in Proceedings of the 2013 ACM workshop on Artificial intelligence and security. ACM, 2013, pp. 45-54.
-
(2013)
Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security. ACM
, pp. 45-54
-
-
Gascon, H.1
Yamaguchi, F.2
Arp, D.3
Rieck, K.4
-
26
-
-
84910677667
-
Semantics-aware android malware classification using weighted contextual api dependency graphs
-
M. Zhang, Y. Duan, H. Yin, and Z. Zhao, "Semantics-aware android malware classification using weighted contextual api dependency graphs, " in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014, pp. 1105-1116.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM
, pp. 1105-1116
-
-
Zhang, M.1
Duan, Y.2
Yin, H.3
Zhao, Z.4
|