메뉴 건너뛰기




Volumn , Issue , 2015, Pages 977-992

SuPOR: Precise and scalable sensitive user input detection for android apps

Author keywords

[No Author keywords available]

Indexed keywords

MHEALTH; SMARTPHONES; STATIC ANALYSIS; USER INTERFACES;

EID: 84979682861     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (122)

References (40)
  • 2
    • 84939479734 scopus 로고    scopus 로고
    • Accessed: 20 Feb 2015
    • Android Dashboards. https://developer.android.com/about/dashboards/index.html. Accessed: 20 Feb 2015.
    • Android Dashboards
  • 5
    • 85178287263 scopus 로고    scopus 로고
    • Drebin: Effective and explainable detection of Android malware in your pocket
    • ARP, D., SPREITZENBARTH, M., HUBNER, M., GASCON, H., AND RIECK, K. DREBIN: Effective and explainable detection of Android malware in your pocket. In NDSS (2014).
    • (2014) NDSS
    • Arp, D.1    Spreitzenbarth, M.2    Hubner, M.3    Gascon, H.4    Rieck, K.5
  • 7
    • 34548780878 scopus 로고    scopus 로고
    • A systematic approach to uncover security flaws in GUI logic
    • Oakland
    • CHEN, S., MESEGUER, J., SASSE, R., WANG, H. J., AND WANG, Y.-M. A systematic approach to uncover security flaws in GUI logic. In S&P (Oakland) (2007).
    • (2007) S&P
    • Chen, S.1    Meseguer, J.2    Sasse, R.3    Wang, H.J.4    Wang, Y.-M.5
  • 8
    • 84888331381 scopus 로고    scopus 로고
    • PIOS: Detecting privacy leaks in iOS applications
    • EGELE, M., KRUEGEL, C., KIRDA, E., AND VIGNA, G. PiOS: Detecting privacy leaks in iOS applications. In NDSS (2011).
    • (2011) NDSS
    • Egele, M.1    Kruegel, C.2    Kirda, E.3    Vigna, G.4
  • 9
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. N. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI (2010).
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 12
    • 84877950290 scopus 로고    scopus 로고
    • AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
    • GIBLER, C., CRUSSELL, J., ERICKSON, J., AND CHEN, H. AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale. In TRUST (2012).
    • (2012) TRUST
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 13
    • 84993660403 scopus 로고    scopus 로고
    • Checking app behavior against app descriptions
    • GORLA, A., TAVECCHIA, I., GROSS, F., AND ZELLER, A. Checking app behavior against app descriptions. In ICSE (2014).
    • (2014) ICSE
    • Gorla, A.1    Tavecchia, I.2    Gross, F.3    Zeller, A.4
  • 14
    • 85165758676 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock Android smartphones
    • GRACE, M., ZHOU, Y., WANG, Z., AND JIANG, X. Systematic detection of capability leaks in stock Android smartphones. In NDSS (2012).
    • (2012) NDSS
    • Grace, M.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 15
    • 84864334986 scopus 로고    scopus 로고
    • Riskranker: Scalable and accurate zero-day Android malware detection
    • GRACE, M., ZHOU, Y., ZHANG, Q., ZOU, S., AND JIANG, X. Riskranker: Scalable and accurate zero-day Android malware detection. In MobiSys (2012).
    • (2012) MobiSys
    • Grace, M.1    Zhou, Y.2    Zhang, Q.3    Zou, S.4    Jiang, X.5
  • 16
    • 85180417656 scopus 로고    scopus 로고
    • Comparing mobile privacy protection through cross-platform applications
    • HAN, J., YAN, Q., GAO, D., ZHOU, J., AND DENG, R. Comparing mobile privacy protection through cross-platform applications. In NDSS (2013).
    • (2013) NDSS
    • Han, J.1    Yan, Q.2    Gao, D.3    Zhou, J.4    Deng, R.5
  • 17
    • 80755187778 scopus 로고    scopus 로고
    • These aren’t the droids you’re looking for: Retrofitting Android to protect data from imperious applications
    • HORNYACK, P., HAN, S., JUNG, J., SCHECHTER, S., AND WETHERALL, D. These aren’t the droids you’re looking for: Retrofitting Android to protect data from imperious applications. In CCS (2011).
    • (2011) CCS
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 18
    • 84976844558 scopus 로고
    • Interprocedural slicing using dependence graphs
    • June
    • HORWITZ, S., REPS, T., AND BINKLEY, D. Interprocedural slicing using dependence graphs. SIGPLAN Not. 23, 7 (June 1988).
    • (1988) SIGPLAN Not , vol.23 , pp. 7
    • Horwitz, S.1    Reps, T.2    Binkley, D.3
  • 19
    • 84878180089 scopus 로고    scopus 로고
    • Improving word representations via global context and multiple word prototypes
    • HUANG, E. H., SOCHER, R., MANNING, C. D., AND NG, A. Y. Improving word representations via global context and multiple word prototypes. In ACL (2012).
    • (2012) ACL
    • Huang, E.H.1    Socher, R.2    Manning, C.D.3    Ng, A.Y.4
  • 20
    • 84994129817 scopus 로고    scopus 로고
    • Asdroid: Detecting stealthy behaviors in Android applications by user interface and program behavior contradiction
    • HUANG, J., ZHANG, X., TAN, L., WANG, P., AND LIANG, B. Asdroid: Detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. In ICSE (2014).
    • (2014) ICSE
    • Huang, J.1    Zhang, X.2    Tan, L.3    Wang, P.4    Liang, B.5
  • 22
    • 85146417759 scopus 로고    scopus 로고
    • Accurate unlexicalized parsing
    • KLEIN, D., AND MANNING, C. D. Accurate unlexicalized parsing. In ACL (2003).
    • (2003) ACL
    • Klein, D.1    Manning, C.D.2
  • 23
    • 85180549026 scopus 로고    scopus 로고
    • Checking more and alerting less: Detecting privacy leakages via enhanced data-flow analysis and peer voting
    • LU, K., LI, Z., KEMERLIS, V., WU, Z., LU, L., ZHENG, C., QIAN, Z., LEE, W., AND JIANG, G. Checking more and alerting less: Detecting privacy leakages via enhanced data-flow analysis and peer voting. In NDSS (2015).
    • (2015) NDSS
    • Lu, K.1    Li, Z.2    Kemerlis, V.3    Wu, Z.4    Lu, L.5    Zheng, C.6    Qian, Z.7    Lee, W.8    Jiang, G.9
  • 24
    • 84869416020 scopus 로고    scopus 로고
    • ChEX: Statically vetting Android apps for component hijacking vulnerabilities
    • LU, L., LI, Z., WU, Z., LEE, W., AND JIANG, G. CHEX: Statically vetting Android apps for component hijacking vulnerabilities. In CCS (2012).
    • (2012) CCS
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.5
  • 25
    • 47249118538 scopus 로고    scopus 로고
    • Automated reverse engineering of hard-coded GUI layouts
    • LUTTEROTH, C. Automated reverse engineering of hard-coded GUI layouts. In AUIC (2008).
    • (2008) AUIC
    • Lutteroth, C.1
  • 26
    • 84944605040 scopus 로고    scopus 로고
    • GUI ripping: Reverse engineering of graphical user interfaces for testing
    • MEMON, A., BANERJEE, I., AND NAGARAJAN, A. GUI ripping: Reverse engineering of graphical user interfaces for testing. In WCRE (2003).
    • (2003) WCRE
    • Memon, A.1    Banerjee, I.2    Nagarajan, A.3
  • 27
    • 84914173351 scopus 로고    scopus 로고
    • Hidden GEMs: Automated discovery of access control vulnerabilities in graphical user interfaces
    • Oakland
    • MULLINER, C., ROBERTSON, W., AND KIRDA, E. Hidden GEMs: Automated discovery of access control vulnerabilities in graphical user interfaces. In S&P (Oakland) (2014).
    • (2014) S&P
    • Mulliner, C.1    Robertson, W.2    Kirda, E.3
  • 28
    • 84888985223 scopus 로고    scopus 로고
    • Preventing accidental data disclosure in modern operating systems
    • NADKARNI, A., AND ENCK, W. Preventing accidental data disclosure in modern operating systems. In CCS (2013).
    • (2013) CCS
    • Nadkarni, A.1    Enck, W.2
  • 29
    • 85058993358 scopus 로고    scopus 로고
    • UiPicker: User-input privacy identification in mobile applications
    • NAN, Y., YANG, M., YANG, Z., ZHOU, S., GU, G., AND WANG, X. UIPicker: User-input privacy identification in mobile applications. In USENIX Security (2015).
    • (2015) USENIX Security
    • Nan, Y.1    Yang, M.2    Yang, Z.3    Zhou, S.4    Gu, G.5    Wang, X.6
  • 30
    • 85019170256 scopus 로고    scopus 로고
    • Whyper: Towards automating risk assessment of mobile applications
    • PANDITA, R., XIAO, X., YANG, W., ENCK, W., AND XIE, T. WHYPER: Towards automating risk assessment of mobile applications. In USENIX Security (2013).
    • (2013) USENIX Security
    • Pandita, R.1    Xiao, X.2    Yang, W.3    Enck, W.4    Xie, T.5
  • 31
    • 84910606183 scopus 로고    scopus 로고
    • AutoCOG: Measuring the description-to-permission fidelity in Android applications
    • QU, Z., RASTOGI, V., ZHANG, X., CHEN, Y., ZHU, T., AND CHEN, Z. AutoCog: Measuring the description-to-permission fidelity in Android applications. In CCS (2014).
    • (2014) CCS
    • Qu, Z.1    Rastogi, V.2    Zhang, X.3    Chen, Y.4    Zhu, T.5    Chen, Z.6
  • 33
    • 85179847964 scopus 로고    scopus 로고
    • A machine-learning approach for classifying and categorizing Android sources and sinks
    • RASTHOFER, S., ARZT, S., AND BODDEN, E. A machine-learning approach for classifying and categorizing Android sources and sinks. In NDSS (2014).
    • (2014) NDSS
    • Rasthofer, S.1    Arzt, S.2    Bodden, E.3
  • 34
    • 85076291957 scopus 로고    scopus 로고
    • AppsplayGround: Automatic security analysis of smartphone applications
    • RASTOGI, V., CHEN, Y., AND ENCK, W. AppsPlayground: Automatic security analysis of smartphone applications. In ASIACCS (2013).
    • (2013) ASIACCS
    • Rastogi, V.1    Chen, Y.2    Enck, W.3
  • 35
    • 77955120634 scopus 로고    scopus 로고
    • The GUISurfer tool: Towards a language independent approach to reverse engineering GUI code
    • SILVA, J. C., SILVA, C., GONÇALO, R. D., SARAIVA, J., AND CAMPOS, J. C. The GUISurfer tool: towards a language independent approach to reverse engineering GUI code. In EICS (2010).
    • (2010) EICS
    • Silva, J.C.1    Silva, C.2    Gonçalo, R.D.3    Saraiva, J.4    Campos, J.C.5
  • 37
    • 84893795422 scopus 로고    scopus 로고
    • Parsing with compositional vector grammars
    • SOCHER, R., BAUER, J., MANNING, C. D., AND NG, A. Y. Parsing with compositional vector grammars. In ACL (2013).
    • (2013) ACL
    • Socher, R.1    Bauer, J.2    Manning, C.D.3    Ng, A.Y.4
  • 38
    • 84889041424 scopus 로고    scopus 로고
    • Appintent: Analyzing sensitive data transmission in Android for privacy leakage detection
    • YANG, Z., YANG, M., ZHANG, Y., GU, G., NING, P., AND WANG, X. S. AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection. In CCS (2013).
    • (2013) CCS
    • Yang, Z.1    Yang, M.2    Zhang, Y.3    Gu, G.4    Ning, P.5    Wang, X.S.6
  • 39
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting Android malware: Characterization and evolution
    • Oakland
    • ZHOU, Y., AND JIANG, X. Dissecting Android malware: Characterization and evolution. In S&P (Oakland) (2012).
    • (2012) S&P
    • Zhou, Y.1    Jiang, X.2
  • 40
    • 85102224279 scopus 로고    scopus 로고
    • Detecting passive content leaks and pollution in Android applications
    • ZHOU, Y., AND JIANG, X. Detecting passive content leaks and pollution in Android applications. In NDSS (2013).
    • (2013) NDSS
    • Zhou, Y.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.