메뉴 건너뛰기




Volumn , Issue , 2014, Pages 531-536

IntentFuzzer: Detecting capability leaks of android applications

Author keywords

Capability leak; Intent fuzzing; Smartphone security

Indexed keywords

ANDROID (OPERATING SYSTEM); TELEPHONE SETS;

EID: 84984865297     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2590296.2590316     Document Type: Conference Paper
Times cited : (71)

References (11)
  • 1
    • 84984913808 scopus 로고    scopus 로고
    • Dalvik Executable Format. http://source.android.com/devices/tech/dalvik/dex-format.html.
    • Dalvik Executable Format
  • 2
    • 84984878009 scopus 로고    scopus 로고
    • drozer. https://labs.mwrinfosecurity.com/tools/drozer/.
    • drozer1
  • 3
    • 84893474006 scopus 로고    scopus 로고
    • Intents and Intent Filters. http://developer.android.com/guide/components/intents-filters.html.
    • Intents and Intent Filters
  • 4
    • 84984878018 scopus 로고    scopus 로고
    • Services. http://developer.android.com/guide/components/services.html.
    • Services
  • 8
    • 84863084209 scopus 로고    scopus 로고
    • Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
    • Springer
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale. In Trust and Trustworthy Computing, pages 291-307. Springer, 2012.
    • (2012) Trust and Trustworthy Computing , pp. 291-307
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.