-
1
-
-
84866918123
-
Using GUI ripping for automated testing of Android applications
-
New York, NY, USA. ACM
-
D. Amalfitano, A. R. Fasolino, P. Tramontana, S. De Carmine, and A. M. Memon. Using GUI ripping for automated testing of Android applications. In IEEE/ACM International Conference on Automated Software Engineering (ASE), pages 258-261, New York, NY, USA, 2012. ACM.
-
(2012)
IEEE/ACM International Conference on Automated Software Engineering (ASE)
, pp. 258-261
-
-
Amalfitano, D.1
Fasolino, A.R.2
Tramontana, P.3
De Carmine, S.4
Memon, A.M.5
-
2
-
-
84869388345
-
PScout: Analyzing the Android permission specification
-
New York, NY, USA. ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. PScout: analyzing the Android permission specification. In ACM Conference on Computer and Communications Security (CCS), pages 217-228, New York, NY, USA, 2012. ACM.
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
3
-
-
84866946869
-
Automatically securing permission-based software by reducing the attack surface: An application to Android
-
A. Bartel, J. Klein, M. Monperrus, and Y. Le Traon. Automatically securing permission-based software by reducing the attack surface: An application to Android. In IEEE/ACM International Conference on Automated Software Engineering (ASE), pages 274-277, 2012.
-
(2012)
IEEE/ACM International Conference on Automated Software Engineering (ASE)
, pp. 274-277
-
-
Bartel, A.1
Klein, J.2
Monperrus, M.3
Le Traon, Y.4
-
5
-
-
79959861450
-
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders
-
New York, NY, USA. ACM
-
E. Bodden, A. Sewe, J. Sinschek, H. Oueslati, and M. Mezini. Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders. In ACM/IEEE International Conference on Software Engineering (ICSE), pages 241-250, New York, NY, USA, 2011. ACM.
-
(2011)
ACM/IEEE International Conference on Software Engineering (ICSE)
, pp. 241-250
-
-
Bodden, E.1
Sewe, A.2
Sinschek, J.3
Oueslati, H.4
Mezini, M.5
-
6
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA. USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In USENIX conference on Operating Systems Design and Implementation (OSDI), pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
USENIX Conference on Operating Systems Design and Implementation (OSDI)
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
7
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA. ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In ACM Conference on Computer and Communications Security (CCS), pages 627-638, New York, NY, USA, 2011. ACM.
-
(2011)
ACM Conference on Computer and Communications Security (CCS)
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
8
-
-
84889066310
-
-
EC SPRIDE Technical Report TUD-CS-2013-0113
-
C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. Highly precise taint analysis for Android applications. Technical Report TUD-CS-2013-0113, EC SPRIDE, 2013.
-
(2013)
Highly Precise Taint Analysis for Android Applications
-
-
Fritz, C.1
Arzt, S.2
Rasthofer, S.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
12
-
-
79959449597
-
Automating GUI testing for Android applications
-
New York, NY, USA. ACM
-
C. Hu and I. Neamtiu. Automating GUI testing for Android applications. In International Workshop on Automation of Software Test (AST), pages 77-83, New York, NY, USA, 2011. ACM.
-
(2011)
International Workshop on Automation of Software Test (AST)
, pp. 77-83
-
-
Hu, C.1
Neamtiu, I.2
-
13
-
-
84953744816
-
A statistical interpretation of term specificity and its application in retrieval
-
K. S. Jones. A statistical interpretation of term specificity and its application in retrieval. Journal of Documentation, 28 (1): 11-21, 1972.
-
(1972)
Journal of Documentation
, vol.28
, Issue.1
, pp. 11-21
-
-
Jones, K.S.1
-
14
-
-
84867459428
-
Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing
-
New York, NY, USA. ACM
-
J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In ACM Conference on Ubiquitous Computing (UbiComp), pages 501-510, New York, NY, USA, 2012. ACM.
-
(2012)
ACM Conference on Ubiquitous Computing (UbiComp)
, pp. 501-510
-
-
Lin, J.1
Amini, S.2
Hong, J.I.3
Sadeh, N.4
Lindqvist, J.5
Zhang, J.6
-
15
-
-
84883731598
-
Dynodroid: An input generation system for Android apps
-
New York, NY, USA. ACM
-
A. Machiry, R. Tahiliani, and M. Naik. Dynodroid: an input generation system for Android apps. In European Software Engineering Conference held jointly with ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE), pages 224-234, New York, NY, USA, 2013. ACM.
-
(2013)
European Software Engineering Conference Held Jointly with ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE)
, pp. 224-234
-
-
Machiry, A.1
Tahiliani, R.2
Naik, M.3
-
16
-
-
0001457509
-
Some methods for classification and analysis of multivariate observations
-
University of California Press L. M. L. Cam and J. Neyman, editors
-
J. B. MacQueen. Some methods for classification and analysis of multivariate observations. In L. M. L. Cam and J. Neyman, editors, Berkeley Symposium on Mathematical Statistics and Probability, volume 1, pages 281-297. University of California Press, 1967.
-
(1967)
Berkeley Symposium on Mathematical Statistics and Probability, Volume 1
, pp. 281-297
-
-
MacQueen, J.B.1
-
19
-
-
85019170256
-
WHYPER: Towards automating risk assessment of mobile applications
-
R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie. WHYPER: Towards automating risk assessment of mobile applications. In USENIX Security Symposium, pages 527-542, 2013.
-
(2013)
USENIX Security Symposium
, pp. 527-542
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
20
-
-
84864270587
-
Inferring method specifications from natural language API descriptions
-
R. Pandita, X. Xiao, H. Zhong, T. Xie, S. Oney, and A. Paradkar. Inferring method specifications from natural language API descriptions. In ACM/IEEE International Conference on Software Engineering (ICSE), 2012.
-
(2012)
ACM/IEEE International Conference on Software Engineering (ICSE)
-
-
Pandita, R.1
Xiao, X.2
Zhong, H.3
Xie, T.4
Oney, S.5
Paradkar, A.6
-
21
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics, 20 (1): 53-65, 1987.
-
(1987)
Journal of Computational and Applied Mathematics
, vol.20
, Issue.1
, pp. 53-65
-
-
Rousseeuw, P.1
-
22
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
B. Schölkopf, J. C. Platt, J. C. Shawe-Taylor, A. J. Smola, and R. C. Williamson. Estimating the support of a high-dimensional distribution. Neural Computation, 13 (7): 1443-1471, 2001.
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.C.3
Smola, A.J.4
Williamson, R.C.5
-
23
-
-
84888986424
-
Asking for (and about) permissions used by Android apps
-
San Francisco, CA
-
R. Stevens, J. Ganz, P. Devanbu, H. Chen, and V. Filkov. Asking for (and about) permissions used by Android apps. In IEEE Working Conference on Mining Software Repositories (MSR), pages 31-40, San Francisco, CA, 2013.
-
(2013)
IEEE Working Conference on Mining Software Repositories (MSR)
, pp. 31-40
-
-
Stevens, R.1
Ganz, J.2
Devanbu, P.3
Chen, H.4
Filkov, V.5
-
24
-
-
41149128704
-
IComment: Bugs or bad comments
-
L. Tan, D. Yuan, G. Krishna, and Y. Zhou. / iComment: Bugs or bad comments /. In ACM SIGOPS Symposium on Operating Systems Principles (SOSP), pages 145-158, 2007.
-
(2007)
ACM SIGOPS Symposium on Operating Systems Principles (SOSP)
, pp. 145-158
-
-
Tan, L.1
Yuan, D.2
Krishna, G.3
Zhou, Y.4
-
25
-
-
37849020292
-
Detecting object usage anomalies
-
New York, NY. ACM
-
A. Wasylkowski, A. Zeller, and C. Lindig. Detecting object usage anomalies. In European Software Engineering Conference held jointly with ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE), pages 35-44, New York, NY, 2007. ACM.
-
(2007)
European Software Engineering Conference Held Jointly with ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE)
, pp. 35-44
-
-
Wasylkowski, A.1
Zeller, A.2
Lindig, C.3
-
26
-
-
84866608644
-
ProfileDroid: Multi-layer profiling of Android applications
-
New York, NY, USA. ACM
-
X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos. ProfileDroid: multi-layer profiling of Android applications. In ACM Annual International Conference on Mobile Computing and networking (MobiCom), pages 137-148, New York, NY, USA, 2012. ACM.
-
(2012)
ACM Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 137-148
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
27
-
-
84874383552
-
A grey-box approach for automated gui-model generation of mobile applications
-
Berlin, Heidelberg Springer-Verlag
-
W. Yang, M. R. Prasad, and T. Xie. A grey-box approach for automated GUI-model generation of mobile applications. In International Conference on Fundamental Approaches to Software Engineering (FASE), pages 250-265, Berlin, Heidelberg, 2013. Springer-Verlag.
-
(2013)
International Conference on Fundamental Approaches to Software Engineering (FASE)
, pp. 250-265
-
-
Yang, W.1
Prasad, M.R.2
Xie, T.3
-
28
-
-
84878368035
-
Dissecting Android malware: Characterization and evolution
-
Washington, DC, USA. IEEE Computer Society
-
Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In IEEE Symposium on Security and Privacy (SP), pages 95-109, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
IEEE Symposium on Security and Privacy (SP)
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
|