-
2
-
-
84939479734
-
-
Accessed: 20 Feb 2015
-
Android Dashboards. https://developer.android.com/about/dashboards/index.html. Accessed: 20 Feb 2015.
-
Android Dashboards
-
-
-
5
-
-
85178287263
-
Drebin: Effective and explainable detection of Android malware in your pocket
-
ARP, D., SPREITZENBARTH, M., HUBNER, M., GASCON, H., AND RIECK, K. DREBIN: Effective and explainable detection of Android malware in your pocket. In NDSS (2014).
-
(2014)
NDSS
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
6
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps
-
ARZT, S., RASTHOFER, S., FRITZ, C., BODDEN, E., BARTEL, A., KLEIN, J., LE TRAON, Y., OCTEAU, D., AND MCDANIEL, P. FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In PLDI (2014).
-
(2014)
PLDI
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
7
-
-
34548780878
-
A systematic approach to uncover security flaws in GUI logic
-
Oakland
-
CHEN, S., MESEGUER, J., SASSE, R., WANG, H. J., AND WANG, Y.-M. A systematic approach to uncover security flaws in GUI logic. In S&P (Oakland) (2007).
-
(2007)
S&P
-
-
Chen, S.1
Meseguer, J.2
Sasse, R.3
Wang, H.J.4
Wang, Y.-M.5
-
8
-
-
84888331381
-
PIOS: Detecting privacy leaks in iOS applications
-
EGELE, M., KRUEGEL, C., KIRDA, E., AND VIGNA, G. PiOS: Detecting privacy leaks in iOS applications. In NDSS (2011).
-
(2011)
NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
9
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. N. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI (2010).
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
10
-
-
85025700509
-
A study of Android application security
-
ENCK, W., OCTEAU, D., MCDANIEL, P., AND CHAUDHURI, S. A study of Android application security. In USENIX Security (2011).
-
(2011)
USENIX Security
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
12
-
-
84877950290
-
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
-
GIBLER, C., CRUSSELL, J., ERICKSON, J., AND CHEN, H. AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale. In TRUST (2012).
-
(2012)
TRUST
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
13
-
-
84993660403
-
Checking app behavior against app descriptions
-
GORLA, A., TAVECCHIA, I., GROSS, F., AND ZELLER, A. Checking app behavior against app descriptions. In ICSE (2014).
-
(2014)
ICSE
-
-
Gorla, A.1
Tavecchia, I.2
Gross, F.3
Zeller, A.4
-
14
-
-
85165758676
-
Systematic detection of capability leaks in stock Android smartphones
-
GRACE, M., ZHOU, Y., WANG, Z., AND JIANG, X. Systematic detection of capability leaks in stock Android smartphones. In NDSS (2012).
-
(2012)
NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
15
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day Android malware detection
-
GRACE, M., ZHOU, Y., ZHANG, Q., ZOU, S., AND JIANG, X. Riskranker: Scalable and accurate zero-day Android malware detection. In MobiSys (2012).
-
(2012)
MobiSys
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
16
-
-
85180417656
-
Comparing mobile privacy protection through cross-platform applications
-
HAN, J., YAN, Q., GAO, D., ZHOU, J., AND DENG, R. Comparing mobile privacy protection through cross-platform applications. In NDSS (2013).
-
(2013)
NDSS
-
-
Han, J.1
Yan, Q.2
Gao, D.3
Zhou, J.4
Deng, R.5
-
17
-
-
80755187778
-
These aren’t the droids you’re looking for: Retrofitting Android to protect data from imperious applications
-
HORNYACK, P., HAN, S., JUNG, J., SCHECHTER, S., AND WETHERALL, D. These aren’t the droids you’re looking for: Retrofitting Android to protect data from imperious applications. In CCS (2011).
-
(2011)
CCS
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
18
-
-
84976844558
-
Interprocedural slicing using dependence graphs
-
June
-
HORWITZ, S., REPS, T., AND BINKLEY, D. Interprocedural slicing using dependence graphs. SIGPLAN Not. 23, 7 (June 1988).
-
(1988)
SIGPLAN Not
, vol.23
, pp. 7
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
19
-
-
84878180089
-
Improving word representations via global context and multiple word prototypes
-
HUANG, E. H., SOCHER, R., MANNING, C. D., AND NG, A. Y. Improving word representations via global context and multiple word prototypes. In ACL (2012).
-
(2012)
ACL
-
-
Huang, E.H.1
Socher, R.2
Manning, C.D.3
Ng, A.Y.4
-
20
-
-
84994129817
-
Asdroid: Detecting stealthy behaviors in Android applications by user interface and program behavior contradiction
-
HUANG, J., ZHANG, X., TAN, L., WANG, P., AND LIANG, B. Asdroid: Detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. In ICSE (2014).
-
(2014)
ICSE
-
-
Huang, J.1
Zhang, X.2
Tan, L.3
Wang, P.4
Liang, B.5
-
21
-
-
0003847769
-
-
1st ed. Prentice Hall PTR, Upper Saddle River, NJ, USA
-
JURAFSKY, D., AND MARTIN, J. H. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition, 1st ed. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2000.
-
(2000)
Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition
-
-
Jurafsky, D.1
Martin, J.H.2
-
22
-
-
85146417759
-
Accurate unlexicalized parsing
-
KLEIN, D., AND MANNING, C. D. Accurate unlexicalized parsing. In ACL (2003).
-
(2003)
ACL
-
-
Klein, D.1
Manning, C.D.2
-
23
-
-
85180549026
-
Checking more and alerting less: Detecting privacy leakages via enhanced data-flow analysis and peer voting
-
LU, K., LI, Z., KEMERLIS, V., WU, Z., LU, L., ZHENG, C., QIAN, Z., LEE, W., AND JIANG, G. Checking more and alerting less: Detecting privacy leakages via enhanced data-flow analysis and peer voting. In NDSS (2015).
-
(2015)
NDSS
-
-
Lu, K.1
Li, Z.2
Kemerlis, V.3
Wu, Z.4
Lu, L.5
Zheng, C.6
Qian, Z.7
Lee, W.8
Jiang, G.9
-
24
-
-
84869416020
-
ChEX: Statically vetting Android apps for component hijacking vulnerabilities
-
LU, L., LI, Z., WU, Z., LEE, W., AND JIANG, G. CHEX: Statically vetting Android apps for component hijacking vulnerabilities. In CCS (2012).
-
(2012)
CCS
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
25
-
-
47249118538
-
Automated reverse engineering of hard-coded GUI layouts
-
LUTTEROTH, C. Automated reverse engineering of hard-coded GUI layouts. In AUIC (2008).
-
(2008)
AUIC
-
-
Lutteroth, C.1
-
26
-
-
84944605040
-
GUI ripping: Reverse engineering of graphical user interfaces for testing
-
MEMON, A., BANERJEE, I., AND NAGARAJAN, A. GUI ripping: Reverse engineering of graphical user interfaces for testing. In WCRE (2003).
-
(2003)
WCRE
-
-
Memon, A.1
Banerjee, I.2
Nagarajan, A.3
-
27
-
-
84914173351
-
Hidden GEMs: Automated discovery of access control vulnerabilities in graphical user interfaces
-
Oakland
-
MULLINER, C., ROBERTSON, W., AND KIRDA, E. Hidden GEMs: Automated discovery of access control vulnerabilities in graphical user interfaces. In S&P (Oakland) (2014).
-
(2014)
S&P
-
-
Mulliner, C.1
Robertson, W.2
Kirda, E.3
-
28
-
-
84888985223
-
Preventing accidental data disclosure in modern operating systems
-
NADKARNI, A., AND ENCK, W. Preventing accidental data disclosure in modern operating systems. In CCS (2013).
-
(2013)
CCS
-
-
Nadkarni, A.1
Enck, W.2
-
29
-
-
85058993358
-
UiPicker: User-input privacy identification in mobile applications
-
NAN, Y., YANG, M., YANG, Z., ZHOU, S., GU, G., AND WANG, X. UIPicker: User-input privacy identification in mobile applications. In USENIX Security (2015).
-
(2015)
USENIX Security
-
-
Nan, Y.1
Yang, M.2
Yang, Z.3
Zhou, S.4
Gu, G.5
Wang, X.6
-
30
-
-
85019170256
-
Whyper: Towards automating risk assessment of mobile applications
-
PANDITA, R., XIAO, X., YANG, W., ENCK, W., AND XIE, T. WHYPER: Towards automating risk assessment of mobile applications. In USENIX Security (2013).
-
(2013)
USENIX Security
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
31
-
-
84910606183
-
AutoCOG: Measuring the description-to-permission fidelity in Android applications
-
QU, Z., RASTOGI, V., ZHANG, X., CHEN, Y., ZHU, T., AND CHEN, Z. AutoCog: Measuring the description-to-permission fidelity in Android applications. In CCS (2014).
-
(2014)
CCS
-
-
Qu, Z.1
Rastogi, V.2
Zhang, X.3
Chen, Y.4
Zhu, T.5
Chen, Z.6
-
32
-
-
84898857625
-
Model-driven reverse engineering of legacy graphical user interfaces
-
RAMÓN, Ó. S., CUADRADO, J. S., AND MOLINA, J. G. Model-driven reverse engineering of legacy graphical user interfaces. Automated Software Engineering 21, 2 (2014).
-
(2014)
Automated Software Engineering
, vol.21
, pp. 2
-
-
Ramón, Ó.S.1
Cuadrado, J.S.2
Molina, J.G.3
-
33
-
-
85179847964
-
A machine-learning approach for classifying and categorizing Android sources and sinks
-
RASTHOFER, S., ARZT, S., AND BODDEN, E. A machine-learning approach for classifying and categorizing Android sources and sinks. In NDSS (2014).
-
(2014)
NDSS
-
-
Rasthofer, S.1
Arzt, S.2
Bodden, E.3
-
34
-
-
85076291957
-
AppsplayGround: Automatic security analysis of smartphone applications
-
RASTOGI, V., CHEN, Y., AND ENCK, W. AppsPlayground: Automatic security analysis of smartphone applications. In ASIACCS (2013).
-
(2013)
ASIACCS
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
35
-
-
77955120634
-
The GUISurfer tool: Towards a language independent approach to reverse engineering GUI code
-
SILVA, J. C., SILVA, C., GONÇALO, R. D., SARAIVA, J., AND CAMPOS, J. C. The GUISurfer tool: towards a language independent approach to reverse engineering GUI code. In EICS (2010).
-
(2010)
EICS
-
-
Silva, J.C.1
Silva, C.2
Gonçalo, R.D.3
Saraiva, J.4
Campos, J.C.5
-
37
-
-
84893795422
-
Parsing with compositional vector grammars
-
SOCHER, R., BAUER, J., MANNING, C. D., AND NG, A. Y. Parsing with compositional vector grammars. In ACL (2013).
-
(2013)
ACL
-
-
Socher, R.1
Bauer, J.2
Manning, C.D.3
Ng, A.Y.4
-
38
-
-
84889041424
-
Appintent: Analyzing sensitive data transmission in Android for privacy leakage detection
-
YANG, Z., YANG, M., ZHANG, Y., GU, G., NING, P., AND WANG, X. S. AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection. In CCS (2013).
-
(2013)
CCS
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
39
-
-
84878368035
-
Dissecting Android malware: Characterization and evolution
-
Oakland
-
ZHOU, Y., AND JIANG, X. Dissecting Android malware: Characterization and evolution. In S&P (Oakland) (2012).
-
(2012)
S&P
-
-
Zhou, Y.1
Jiang, X.2
-
40
-
-
85102224279
-
Detecting passive content leaks and pollution in Android applications
-
ZHOU, Y., AND JIANG, X. Detecting passive content leaks and pollution in Android applications. In NDSS (2013).
-
(2013)
NDSS
-
-
Zhou, Y.1
Jiang, X.2
|