-
2
-
-
84876185647
-
-
Google play market. https: //play. google. com/store/apps/.
-
Google Play Market
-
-
-
4
-
-
84994148851
-
-
Wandoujia. http: //www. wandoujia. com/apps/.
-
-
-
-
5
-
-
0004072686
-
-
Pearson Education, Inc.
-
A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools (2nd Edition). Pearson Education, Inc., 2006.
-
(2006)
Compilers: Principles, Techniques, and Tools (2nd Edition)
-
-
Aho, A.V.1
Lam, M.S.2
Sethi, R.3
Ullman, J.D.4
-
6
-
-
84994070888
-
How useful are existing monitoring languages for securing Android apps
-
S. Arzt, K. Falzon, A. Follner, S. Rasthofer, E. Bodden, and V. Stolz. How useful are existing monitoring languages for securing Android apps In ATPS'13.
-
ATPS'13
-
-
Arzt, S.1
Falzon, K.2
Follner, A.3
Rasthofer, S.4
Bodden, E.5
Stolz, V.6
-
7
-
-
84994076754
-
Mobile security catching up revealing the nuts and bolts of the security of mobile devices
-
M. Becher, F. C. Freiling, J. Homann, T. Holz, S. Uellenbeck, and C. Wolf. Mobile security catching up revealing the nuts and bolts of the security of mobile devices. In S&P'11.
-
S&P'11
-
-
Becher, M.1
Freiling, F.C.2
Homann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
8
-
-
0004116989
-
-
The MIT Press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms, Third Edition. The MIT Press, 2009.
-
(2009)
Introduction to Algorithms, Third Edition
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
9
-
-
84877931620
-
User-centric dependence analysis for identifying malicious mobile apps
-
K. Elish, D. D. Yao, and B. G. Ryder. User-centric dependence analysis for identifying malicious mobile apps. In MoST'12.
-
MoST'12
-
-
Elish, K.1
Yao, D.D.2
Ryder, B.G.3
-
10
-
-
84994127312
-
Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-ow tracking system for realtime privacy monitoring on smartphones. In OSDI'10.
-
OSDI'10
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
13
-
-
84889066310
-
-
Technical report, TU Darmstadt
-
C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. Highly precise taint analysis for Android applications. Technical report, TU Darmstadt, 2013.
-
(2013)
Highly Precise Taint Analysis for Android Applications
-
-
Fritz, C.1
Arzt, S.2
Rasthofer, S.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
15
-
-
84877950290
-
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale. In TRUST'12.
-
TRUST'12
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
16
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung. Vision: automated security validation of mobile apps at app markets. In MCS'11.
-
MCS'11
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
18
-
-
84897114466
-
-
Google
-
Google. Android developer guide. http: //developer. android. com/guide/.
-
Android Developer Guide
-
-
-
19
-
-
15744373601
-
Trojan: Trojans & spyware: An electronic achilles
-
Mar.
-
P. Gosling. Trojan: Trojans & spyware: an electronic achilles. Netw. Secur., 2005 (3): 17-18, Mar. 2005.
-
(2005)
Netw. Secur
, vol.2005
, Issue.3
, pp. 17-18
-
-
Gosling, P.1
-
21
-
-
80755187778
-
These aren't the droids you're looking for: Retrotting Android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrotting Android to protect data from imperious applications. In CCS'11.
-
CCS'11
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
23
-
-
80755172888
-
-
Doctoral dissertation, Tampere University of Technology, Tampere, Finland, Jan.
-
A. Jaaskelainen. Design, Implementation and Use of a Test Model Library for GUI Testing of Smartphone Applications. Doctoral dissertation, Tampere University of Technology, Tampere, Finland, Jan. 2011.
-
(2011)
Design, Implementation and Use of A Test Model Library for GUI Testing of Smartphone Applications
-
-
Jaaskelainen, A.1
-
25
-
-
84994075167
-
Is it harder to parse Chinese, or the Chinese Treebank
-
R. Levy and C. D. Manning. Is it harder to parse Chinese, or the Chinese Treebank In ACL'03.
-
ACL'03
-
-
Levy, R.1
Manning, C.D.2
-
28
-
-
84904692139
-
-
National Taiwan University
-
National Taiwan University. Chinese wordnet. http: //lope. linguistics. ntu. edu. tw/cwm/.
-
Chinese Wordnet
-
-
-
29
-
-
85075955161
-
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysi
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysi. In USENIX Security'13.
-
USENIX Security'13
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Traon, Y.L.7
-
31
-
-
84994074193
-
-
pxb1988. dex2jar: Tools to work with android dex and Java class files
-
pxb1988. dex2jar: Tools to work with android. dex and Java. class files. http: //code. google. com/p/dex2jar/.
-
-
-
-
32
-
-
84994126703
-
-
TrendLabs. 3Q 2012 security roundup-Android under siege: Popularity comes at a price
-
TrendLabs. 3Q 2012 security roundup-Android under siege: Popularity comes at a price. http: //www. trendmicro. com/us/security-intelligence/.
-
-
-
-
33
-
-
84865295917
-
Finding errors in multithreaded GUI applications
-
S. Zhang, H. Lu, and M. D. Ernst. Finding errors in multithreaded GUI applications. In ISSTA'12.
-
ISSTA'12
-
-
Zhang, S.1
Lu, H.2
Ernst, M.D.3
-
34
-
-
84906485726
-
Dissecting Android malware: Characterization and evolution
-
Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In S&P'12.
-
S&P'12
-
-
Zhou, Y.1
Jiang, X.2
-
35
-
-
84994132940
-
Hey, you, get o of my market: Detecting malicious apps in oficial and alternative Android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get o of my market: Detecting malicious apps in oficial and alternative Android markets. In NDSS'12.
-
NDSS'12
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|