-
1
-
-
84984871472
-
-
dex2jar
-
dex2jar. http://code.google.com/p/dex2jar/.
-
-
-
-
2
-
-
84984915104
-
-
Privacy blocker. http://privacytools.xeudoxus.com/.
-
Privacy Blocker
-
-
-
5
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
October
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh. Cells: A Virtual Mobile Smartphone Architecture. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11), October 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11)
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
7
-
-
84983751618
-
Contextual policy enforcement in android applications with permission event graphs
-
February
-
K. Z. Chen, N. Johnson, V. D'Silva, S. Dai, K. MacNamara, T. Magrino, E. X. Wu, M. Rinard, and D. Song. Contextual Policy Enforcement in Android Applications with Permission Event Graphs. In Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS'13), February 2013.
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS'13)
-
-
Chen, K.Z.1
Johnson, N.2
D'Silva, V.3
Dai, S.4
MacNamara, K.5
Magrino, T.6
Wu, E.X.7
Rinard, M.8
Song, D.9
-
12
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
October
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10), October 2010.
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
15
-
-
80755187788
-
Android permissions demystified
-
October
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
16
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
August
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
19
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
October
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't The Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
22
-
-
80755143400
-
L4Android: A generic operating system framework for secure smartphones
-
October
-
M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter. L4Android: A Generic Operating System Framework for Secure Smartphones. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11), October 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'11)
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
23
-
-
84910671247
-
Automatic mediation of privacy-sensitive resource access in smartphone applications
-
August
-
B. Livshits and J. Jung. Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications. In Proceedings of the 22th Usenix Security Symposium, August 2013.
-
(2013)
Proceedings of the 22th Usenix Security Symposium
-
-
Livshits, B.1
Jung, J.2
-
24
-
-
84869416020
-
CHEX: Statically vetting Android apps for component hijacking vulnerabilities
-
October
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. CHEX: statically vetting Android apps for component hijacking vulnerabilities. In Proceedings of the 2012 ACM Conferenceon Computer and Communications Security (CCS'12), October 2012.
-
(2012)
Proceedings of the 2012 ACM Conferenceon Computer and Communications Security (CCS'12)
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
26
-
-
31744432699
-
Finding application errors and security flaws using PQL: A program query language
-
October
-
M. Martin, B. Livshits, and M. S. Lam. Finding Application Errors and Security Flaws Using PQL: A Program Query Language. In Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA'05), October 2005.
-
(2005)
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA'05)
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
31
-
-
85011343656
-
AirBag: Boosting smartphone resistance to malware infection
-
February
-
C. Wu, Y. Zhou, K. Patel, Z. Liang, and X. Jiang. AirBag: Boosting Smartphone Resistance to Malware Infection. In Proceedings of the 21th Annual Network and Distributed System Security Symposium (NDSS'14), February 2014.
-
(2014)
Proceedings of the 21th Annual Network and Distributed System Security Symposium (NDSS'14)
-
-
Wu, C.1
Zhou, Y.2
Patel, K.3
Liang, Z.4
Jiang, X.5
-
34
-
-
84889041424
-
AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection
-
November
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang. AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS'13), November 2013.
-
(2013)
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS'13)
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
38
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
February
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of 19th Annual Network and Distributed System Security Symposium (NDSS'12), February 2012.
-
(2012)
Proceedings of 19th Annual Network and Distributed System Security Symposium (NDSS'12)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|