-
1
-
-
84984913808
-
-
Dalvik Executable Format. http://source.android.com/devices/tech/dalvik/dex-format.html.
-
Dalvik Executable Format
-
-
-
2
-
-
84984878009
-
-
drozer. https://labs.mwrinfosecurity.com/tools/drozer/.
-
-
-
drozer1
-
3
-
-
84893474006
-
-
Intents and Intent Filters. http://developer.android.com/guide/components/intents-filters.html.
-
Intents and Intent Filters
-
-
-
4
-
-
84984878018
-
-
Services. http://developer.android.com/guide/components/services.html.
-
Services
-
-
-
6
-
-
79961035117
-
Analyzing inter-application communication in android
-
ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, pages 239-252. ACM, 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
7
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In Proceedings of the 20th USENIX Security Symposium, volume 18, pages 19-31, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
, vol.18
, pp. 19-31
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
8
-
-
84863084209
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
Springer
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale. In Trust and Trustworthy Computing, pages 291-307. Springer, 2012.
-
(2012)
Trust and Trustworthy Computing
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
9
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
ACM
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung. Vision: automated security validation of mobile apps at app markets. In Proceedings of the second international workshop on Mobile cloud computing and services, pages 21-26. ACM, 2011.
-
(2011)
Proceedings of the Second International Workshop on Mobile Cloud Computing and Services
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
11
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
ACM
-
Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang. Vetting undesirable behaviors in android apps with permission use analysis. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 611-622. ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 611-622
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
Gu, G.5
Ning, P.6
Wang, X.S.7
Zang, B.8
|