-
1
-
-
85040679110
-
-
2015-05-20
-
Apktool. Apktool. http://ibotpeaches.github.io/Apktool/, 2015-05-20
-
Apktool. Apktool.
-
-
-
3
-
-
85040672388
-
-
2015-03-28
-
Android. Android sensor overview. http://developer.android.com/guide/topics/sensors/sensors_overview.html, 2015-03-28
-
Android. Android sensor overview
-
-
-
4
-
-
85040687590
-
-
2015-03-29
-
Android. Android sensor type. http://developer.android.com/reference/android/hardware/Sensor.html, 2015-03-29
-
Android. Android sensor type
-
-
-
5
-
-
85021778897
-
-
Android. Dalvik bytecode. https://source.android.com/devices/tech/dalvik/dalvik-bytecode.html (2016)
-
(2016)
Android. Dalvik bytecode
-
-
-
6
-
-
84907029013
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, p 29. ACM (2014)
-
(2014)
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, p 29. ACM
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
7
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones. In: ACSAC 2012, pp. 41–50. ACM (2012)
-
(2012)
ACSAC 2012, pp. 41–50. ACM
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
9
-
-
84994101812
-
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
-
Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In: Proceedings of the 36th International Conference on Software Engineering, pp. 175–186. ACM (2014)
-
(2014)
Proceedings of the 36th International Conference on Software Engineering, pp. 175–186. ACM
-
-
Chen, K.1
Liu, P.2
Zhang, Y.3
-
10
-
-
85076271905
-
Finding unknown Malice in 10 seconds Mass vetting for new threats at the google-play scale
-
Chen, K., Wang, P., Lee, Y., Wang, X.F., Zhang, N., Huang, H., Zou, W., Liu, P.: Finding unknown Malice in 10 seconds Mass vetting for new threats at the google-play scale. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 659–674 (2015)
-
(2015)
24th USENIX Security Symposium (USENIX Security 15)
, pp. 659-674
-
-
Chen, K.1
Wang, P.2
Lee, Y.3
Wang, X.F.4
Zhang, N.5
Huang, H.6
Zou, W.7
Liu, P.8
-
12
-
-
84923250812
-
Profiling user-trigger dependence for android malware detection
-
Elish, K.O., Shu, X., Yao, D.D., Ryder, B.G, Jiang, X.: Profiling user-trigger dependence for android malware detection. Comput. Secur. 49, 255–273 (2015)
-
(2015)
Comput. Secur.
, vol.49
, pp. 255-273
-
-
Elish, K.O.1
Shu, X.2
Yao, D.D.3
Ryder, B.G.4
Jiang, X.5
-
13
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
Ester, M., Kriegel, H.-P., Sander, J., Xiaowei, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd, vol. 96, pp. 226–231 (1996)
-
(1996)
Kdd
, vol.96
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xiaowei, X.4
-
14
-
-
84889046959
-
Structural detection of android malware using embedded call graphs
-
Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: Proceedings of the ACM Workshop on Artificial Intelligence and Security, p. 2013. ACM (2013)
-
(2013)
Proceedings of the ACM Workshop on Artificial Intelligence and Security, p. 2013. ACM
-
-
Gascon, H.1
Yamaguchi, F.2
Arp, D.3
Rieck, K.4
-
17
-
-
84877942991
-
Slicing droids: program slicing for smali code
-
Hoffmann, J., Ussath, M., Holz, T., Spreitzenbarth, M.: Slicing droids: program slicing for smali code. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1844–1851. ACM (2013)
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing,. ACM
, pp. 1844-1851
-
-
Hoffmann, J.1
Ussath, M.2
Holz, T.3
Spreitzenbarth, M.4
-
19
-
-
84954482087
-
Android taint flow analysis for app. sets
-
Klieber, W., Flynn, L., Bhosale, A., Jia, L., Bauer, L.: Android taint flow analysis for app. sets. In: Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, pp. 1–6. ACM (2014)
-
(2014)
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis,. ACM
, pp. 1-6
-
-
Klieber, W.1
Flynn, L.2
Bhosale, A.3
Jia, L.4
Bauer, L.5
-
21
-
-
84943159826
-
Iccta: detecting inter-component privacy leaks in android apps
-
Li, L., Bartel, A., Bissyande, T.F.D.A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., McDaniel, P.: Iccta: detecting inter-component privacy leaks in android apps. In: 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015) (2015)
-
(2015)
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015)
-
-
Li, L.1
Bartel, A.2
Bissyande, T.F.D.A.3
Klein, J.4
Le Traon, Y.5
Arzt, S.6
Rasthofer, S.7
Bodden, E.8
Octeau, D.9
McDaniel, P.10
-
22
-
-
84866647491
-
A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: IEEE 6th International Conference on Software Security and Reliability (SERE), p. 2012
-
Lin, C.-C., Liang, D., Chang, C.-C., Yang, C.-H.: A new non-intrusive authentication method based on the orientation sensor for smartphone users. In: IEEE 6th International Conference on Software Security and Reliability (SERE), p. 2012. IEEE (2012)
-
(2012)
IEEE
-
-
Lin, C.-C.1
Liang, D.2
Chang, C.-C.3
Yang, C.-H.4
-
23
-
-
84969981400
-
Exploring sensor usage behaviors of android applications based on data flow analysis
-
Liu, X., Liu, J., Wang, W.: Exploring sensor usage behaviors of android applications based on data flow analysis. In: 34th IEEE International Performance Computing and Communications Conference, IPCCC 2015, Nanjing, China, December 14-16, 2015, pp. 1–8 (2015)
-
(2015)
34th IEEE International Performance Computing and Communications Conference, IPCCC 2015, Nanjing, China, December 14-16, 2015
, pp. 1-8
-
-
Liu, X.1
Liu, J.2
Wang, W.3
-
24
-
-
85040653940
-
Alde: Privacy risk analysis of analytics libraries in the android ecosystem
-
Liu, X., Zhu, S., Wang, W., Jiqiang, L.: Alde: Privacy risk analysis of analytics libraries in the android ecosystem. In: 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10–12, 2016 (2016)
-
(2016)
12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October
, pp. 10-12
-
-
Liu, X.1
Zhu, S.2
Wang, W.3
Jiqiang, L.4
-
25
-
-
84864372370
-
Tapprints: your finger taps have fingerprints
-
Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323–336. ACM (2012)
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services,. ACM
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
-
26
-
-
85075955161
-
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
-
Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Le Traon, Y.: Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In: Proceedings of the 22nd USENIX Security Symposium. Citeseer (2013)
-
(2013)
Proceedings of the 22nd USENIX Security Symposium. Citeseer
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Le Traon, Y.7
-
27
-
-
85040701189
-
Accessory: password inference using accelerometers on smartphones
-
Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. ACM (2012)
-
(2012)
ACM
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
28
-
-
85040669447
-
-
2015-12-09
-
Soot. Soot. http://sable.github.io/soot/, 2015-12-09
-
Soot. Soot.
-
-
-
30
-
-
85015148814
-
Anomadroid: profiling android application behaviors for identifying unknown malapps
-
Su, D., Wang, W., Wang, X., Liu, J.: Anomadroid: profiling android application behaviors for identifying unknown malapps. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016 (2016)
-
(2016)
15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016
-
-
Su, D.1
Wang, W.2
Wang, X.3
Liu, J.4
-
33
-
-
84908058224
-
Exploring permission-induced risk in android applications for Malicious application detection
-
Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for Malicious application detection. IEEE Trans. Inf. Forensics Secur. 9(11), 1869–1882 (2014)
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.11
, pp. 1869-1882
-
-
Wang, W.1
Wang, X.2
Feng, D.3
Liu, J.4
Han, Z.5
Zhang, X.6
-
34
-
-
84910617173
-
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps
-
Wei, F., Roy, S., Ou, X., et al.: Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In: CCS 2014, pp. 1329–1341. ACM (2014)
-
(2014)
CCS 2014,. ACM
, pp. 1329-1341
-
-
Wei, F.1
Roy, S.2
Ou, X.3
-
35
-
-
85040651103
-
-
2015-04-05
-
WIKI. Dbscan. http://en.wikipedia.org/wiki/DBSCAN, 2015-04-05
-
WIKI. Dbscan.
-
-
-
36
-
-
77954692432
-
Comparing Stars: On Approximating Graph Edit Distance
-
Zeng, Z., Tung, A.K.H., Wang, J., Feng, J., Lizhu, Z.: Comparing Stars: On Approximating Graph Edit Distance. In: Proceedings of the Vldb Endowment 2, 25–36 (2009)
-
(2009)
Proceedings of The Vldb Endowment
, vol.2
, pp. 25-36
-
-
Zeng, Z.1
Tung, A.K.H.2
Wang, J.3
Feng, J.4
Lizhu, Z.5
-
37
-
-
84860679345
-
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
-
Zhi, X., Bai, K., Zhu, S.: Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113–124. ACM (2012)
-
(2012)
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks,. ACM
, pp. 113-124
-
-
Zhi, X.1
Bai, K.2
Zhu, S.3
-
38
-
-
84907403322
-
Viewdroid: Towards obfuscation-resilient mobile application repackaging detection
-
Zhang, F., Huang, H., Zhu, S., Dinghao, W., Liu, P.: Viewdroid: Towards obfuscation-resilient mobile application repackaging detection. In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec 2014). Citeseer (2014)
-
(2014)
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec 2014). Citeseer
-
-
Zhang, F.1
Huang, H.2
Zhu, S.3
Dinghao, W.4
Liu, P.5
-
39
-
-
84910677667
-
Semantics-aware android malware classification using weighted contextual api dependency graphs
-
Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual api dependency graphs. In: CCS 2014, pp. 1105–1116. ACM (2014)
-
(2014)
CCS 2014,. ACM
, pp. 1105-1116
-
-
Zhang, M.1
Duan, Y.2
Yin, H.3
Zhao, Z.4
-
40
-
-
84877622605
-
Sensec: Mobile security through passive sensing. In: 2013 International Conference on Computing, Networking and Communications (ICNC), pp. 1128–1133
-
Zhu, J., Wu, P., Wang, X., Zhang, J.: Sensec: Mobile security through passive sensing. In: 2013 International Conference on Computing, Networking and Communications (ICNC), pp. 1128–1133. IEEE (2013)
-
(2013)
IEEE
-
-
Zhu, J.1
|