-
1
-
-
80755187788
-
Android permissions demystified
-
F. Adrienne, Porter, C. Erika, H. Steve, S. Dawn, and W. David. Android permissions demystified. In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2011.
-
(2011)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Adrienne, F.1
Erika, P.C.2
Steve, H.3
Dawn, S.4
David, W.5
-
2
-
-
84963871803
-
-
C-skill. Gingerbreak. http://c-skills.blogspot.hk/2011/04/yummyyummy-gingerbreak.html, 2011.
-
(2011)
Gingerbreak
-
-
C-skill1
-
3
-
-
84984922403
-
-
C-skill. Rageagainstthecage. https://github.com/bibanon/androiddevelopment-codex/wiki/rageagainstthecage, 2011.
-
(2011)
Rageagainstthecage
-
-
C-skill1
-
5
-
-
84984893175
-
-
C. Daily. Low-end smartphone fight. http://www.chinadaily.com.cn/bizchina/2012smartphone/2012-07/16/content-15703750.htm, 2012.
-
(2012)
Low-end Smartphone Fight
-
-
Daily, C.1
-
8
-
-
85025700509
-
A study of android application security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, 2011.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
9
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A Survey of Mobile Malware in the Wild. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
11
-
-
84984866358
-
-
Google. virustotal. https://www.virustotal.com/, 2013.
-
(2013)
Virustotal
-
-
Google1
-
18
-
-
84921480262
-
Run-time enforcement of information-flow properties on Android (extended abstract)
-
Sept.
-
L. Jia, J. Aljuraidan, E. Fragkaki, L. Bauer, M. Stroucken, K. Fukushima, S. Kiyomoto, and Y. Miyake. Run-time enforcement of information-flow properties on Android (extended abstract). In Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Sept. 2013.
-
(2013)
Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security
-
-
Jia, L.1
Aljuraidan, J.2
Fragkaki, E.3
Bauer, L.4
Stroucken, M.5
Fukushima, K.6
Kiyomoto, S.7
Miyake, Y.8
-
20
-
-
84984895808
-
The impact of vendor customizations on android security
-
W. Lei, G. Michael, Z. Yajin, W. Chiachih, and J. Xuxian. The impact of vendor customizations on android security. In Proceedings of ACM Conference on Computer and Communications Security (CCS), 2013.
-
(2013)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Lei, W.1
Michael, G.2
Yajin, Z.3
Chiachih, W.4
Xuxian, J.5
-
23
-
-
84878002579
-
Droidchameleon: Evaluating android anti-malware against transformation attacks
-
V. Rastogi, Y. Chen, and X. Jiang. Droidchameleon: evaluating android anti-malware against transformation attacks. In Proceedings of the ASIACCS '13.
-
Proceedings of the ASIACCS'13
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
24
-
-
84984866380
-
-
Revolutionary. Zergrush. http://forum.xdadevelopers.com/showthread.php?t=1296916, 2011.
-
(2011)
Zergrush
-
-
Revolutionary1
-
33
-
-
84869771631
-
Short paper: Enhancing users' comprehension of android permissions
-
L. Yang, N. Boushehrinejadmoradi, P. Roy, V. Ganapathy, and L. Iftode. Short paper: enhancing users' comprehension of android permissions. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, 2012.
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '12
-
-
Yang, L.1
Boushehrinejadmoradi, N.2
Roy, P.3
Ganapathy, V.4
Iftode, L.5
-
34
-
-
84869757378
-
Smartdroid: An automatic system for revealing ui-based trigger conditions in android applications
-
C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou. Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, 2012.
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '12
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Han, X.6
Zou, W.7
-
35
-
-
84875665845
-
Adam: An automatic and extensible platform to stress test android anti-virus systems
-
M. Zheng, P. P. C. Lee, and J. C. S. Lui. Adam: an automatic and extensible platform to stress test android anti-virus systems. In Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'12, 2013.
-
(2013)
Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'12
-
-
Zheng, M.1
Lee, P.P.C.2
Lui, J.C.S.3
-
40
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012.
-
(2012)
Proceedings of the 19th Annual Network & Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|