-
3
-
-
80051990340
-
OpenConflict: Preventing real time map hacks in online games
-
May
-
Bursztein, E., Hamburg, M., Lagarenne, J., and Boneh, D. OpenConflict: Preventing Real Time Map Hacks in Online Games. In IEEE Symposium on Security and Privacy (May 2011).
-
(2011)
IEEE Symposium on Security and Privacy
-
-
Bursztein, E.1
Hamburg, M.2
Lagarenne, J.3
Boneh, D.4
-
4
-
-
84984899961
-
-
November
-
Chainfire. SuperSU. https://play:google:com/store/apps/details?id=eu:chainfire:supersu&hl=en, November 2012.
-
(2012)
SuperSU
-
-
Chainfire1
-
6
-
-
84983067510
-
-
November
-
CLShortFuse. SuperOneClick. http://forum:xda-developers:com/showthread:php?t=803682, November 2012.
-
(2012)
SuperOneClick
-
-
CLShortFuse1
-
8
-
-
84881159901
-
I-ARM-Droid: A rewriting framework for in-app reference monitors for android applications
-
May
-
Davis, B., Sanders, B., Khodaverdian, A., and Chen, H. I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications. In Workshop on Mobile Security Technologies (MoST) (May 2012).
-
(2012)
Workshop on Mobile Security Technologies (MoST)
-
-
Davis, B.1
Sanders, B.2
Khodaverdian, A.3
Chen, H.4
-
9
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
Egele, M., Kruegel, C., Kirda, E., and Vigna, G. PiOS: Detecting Privacy Leaks in iOS Applications. In Network and Distirbuted Systems Security Symposium (NDSS) (2 2011).
-
(2011)
Network and Distirbuted Systems Security Symposium (NDSS)
, Issue.2
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
10
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck, W., Gilbert, P., Chun, B., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Symposium on Operating Systems Design and Implementation (OSDI) (2010).
-
(2010)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
12
-
-
84984900005
-
-
November
-
Google. In-app Billing. http://developer:android:com/guide/google/play/billing/, November 2012.
-
(2012)
In-app Billing
-
-
Google1
-
13
-
-
84984913585
-
-
November
-
Google. In-app Billing Security and Design. http://developer:android:com/guide/google/play/billing/billing-best-practices:html, November 2012.
-
(2012)
In-app Billing Security and Design
-
-
Google1
-
14
-
-
84983046149
-
-
November
-
HTC. Unlock Bootloader. http://htcdev:com/bootloader/, November 2012.
-
(2012)
Unlock Bootloader
-
-
HTC1
-
15
-
-
67650790241
-
Server-side bot detection in massively multiplayer online games
-
Mitterhofer, S., Platzer, C., Kirda, E., and Kruegel, C. Server-side Bot Detection in Massively Multiplayer Online Games. IEEE Security and Privacy Magazine (5 2009).
-
(2009)
IEEE Security and Privacy Magazine
, Issue.5
-
-
Mitterhofer, S.1
Platzer, C.2
Kirda, E.3
Kruegel, C.4
-
16
-
-
84984875702
-
-
November
-
Oracle. The Reflection API. http://docs:oracle:com/javase/tutorial/reflect/index:html, November 2012.
-
(2012)
The Reflection API
-
-
Oracle1
-
17
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Petroni Jr, N., Fraser, T., Walters, A., and Arbaugh, W. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium (2006).
-
(2006)
USENIX Security Symposium
-
-
Petroni, N.1
Fraser, T.2
Walters, A.3
Arbaugh, W.4
-
18
-
-
84983046822
-
POSTER: FreeMarket: Shopping for free in Android applications
-
February
-
Reynaud, D., Song, D., Tom Magrino, E. W., and Shin, R. POSTER: FreeMarket: Shopping for free in Android applications. In ISOC Network and Distributed System Security Symposium (NDSS) (February 2012).
-
(2012)
ISOC Network and Distributed System Security Symposium (NDSS)
-
-
Reynaud, D.1
Song, D.2
Tom Magrino, E.W.3
Shin, R.4
-
19
-
-
84885617227
-
Verifying code integrity and enforcing untampered code execution on legacy systems
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., and Khosla, P. Verifying code integrity and enforcing untampered code execution on legacy systems. In ACM Symposium on Operating System Principles (SOSP) (2005).
-
(2005)
ACM Symposium on Operating System Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
20
-
-
0036641696
-
Trojan horse attacks on software for electronic signatures
-
Spalka, A., Cremers, A., and Langweg, H. Trojan Horse Attacks on Software for Electronic Signatures. In Informatica (2002).
-
(2002)
Informatica
-
-
Spalka, A.1
Cremers, A.2
Langweg, H.3
-
24
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
August
-
Xu, R., Saidi, H., and Anderson, R. Aurasium: Practical Policy Enforcement for Android Applications. In USENIX Security Symposium (August 2012).
-
(2012)
USENIX Security Symposium
-
-
Xu, R.1
Saidi, H.2
Anderson, R.3
-
25
-
-
85060493868
-
DroidScope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis
-
August
-
Yan, L. K., and Yin, H. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In USENIX Security Symposium (August 2012).
-
(2012)
USENIX Security Symposium
-
-
Yan, L.K.1
Yin, H.2
|