메뉴 건너뛰기




Volumn , Issue , 2014, Pages 459-470

VirtualSwindle: An automated attack against in-app billing on Android

Author keywords

App protection; Mobile application; Payment; Smartphone security

Indexed keywords

AUTOMATION;

EID: 84984907980     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2590296.2590335     Document Type: Conference Paper
Times cited : (28)

References (26)
  • 4
    • 84984899961 scopus 로고    scopus 로고
    • November
    • Chainfire. SuperSU. https://play:google:com/store/apps/details?id=eu:chainfire:supersu&hl=en, November 2012.
    • (2012) SuperSU
    • Chainfire1
  • 6
    • 84983067510 scopus 로고    scopus 로고
    • November
    • CLShortFuse. SuperOneClick. http://forum:xda-developers:com/showthread:php?t=803682, November 2012.
    • (2012) SuperOneClick
    • CLShortFuse1
  • 12
    • 84984900005 scopus 로고    scopus 로고
    • November
    • Google. In-app Billing. http://developer:android:com/guide/google/play/billing/, November 2012.
    • (2012) In-app Billing
    • Google1
  • 13
    • 84984913585 scopus 로고    scopus 로고
    • November
    • Google. In-app Billing Security and Design. http://developer:android:com/guide/google/play/billing/billing-best-practices:html, November 2012.
    • (2012) In-app Billing Security and Design
    • Google1
  • 14
    • 84983046149 scopus 로고    scopus 로고
    • November
    • HTC. Unlock Bootloader. http://htcdev:com/bootloader/, November 2012.
    • (2012) Unlock Bootloader
    • HTC1
  • 16
    • 84984875702 scopus 로고    scopus 로고
    • November
    • Oracle. The Reflection API. http://docs:oracle:com/javase/tutorial/reflect/index:html, November 2012.
    • (2012) The Reflection API
    • Oracle1
  • 17
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • Petroni Jr, N., Fraser, T., Walters, A., and Arbaugh, W. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium (2006).
    • (2006) USENIX Security Symposium
    • Petroni, N.1    Fraser, T.2    Walters, A.3    Arbaugh, W.4
  • 20
    • 0036641696 scopus 로고    scopus 로고
    • Trojan horse attacks on software for electronic signatures
    • Spalka, A., Cremers, A., and Langweg, H. Trojan Horse Attacks on Software for Electronic Signatures. In Informatica (2002).
    • (2002) Informatica
    • Spalka, A.1    Cremers, A.2    Langweg, H.3
  • 24
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: Practical policy enforcement for android applications
    • August
    • Xu, R., Saidi, H., and Anderson, R. Aurasium: Practical Policy Enforcement for Android Applications. In USENIX Security Symposium (August 2012).
    • (2012) USENIX Security Symposium
    • Xu, R.1    Saidi, H.2    Anderson, R.3
  • 25
    • 85060493868 scopus 로고    scopus 로고
    • DroidScope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis
    • August
    • Yan, L. K., and Yin, H. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In USENIX Security Symposium (August 2012).
    • (2012) USENIX Security Symposium
    • Yan, L.K.1    Yin, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.