-
2
-
-
85076304041
-
-
Apple
-
Apple. iphone 5s, 2013.
-
(2013)
Iphone 5s
-
-
-
4
-
-
70349141059
-
On the limits of information flow techniques for malware analysis and containment
-
L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for malware analysis and containment. In DIMVA '08, 2008.
-
(2008)
DIMVA '08
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
5
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
J. Clause, W. Li, and A. Orso. Dytan: a generic dynamic taint analysis framework. In ISSTA '07, 2007.
-
(2007)
ISSTA '07
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
6
-
-
84860859593
-
Investigating the distribution of password choices
-
April
-
David Malone and Kevin Maher. Investigating the Distribution of Password Choices. In WWW '12, April 2012.
-
(2012)
WWW '12
-
-
Malone, D.1
Maher, K.2
-
7
-
-
85076312162
-
-
Dazzlepod
-
Dazzlepod. Uniqpass v11, 2013.
-
(2013)
Uniqpass V11
-
-
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, May 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
9
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the asbestos operating system. In SOSP '05, 2005.
-
(2005)
SOSP '05
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
10
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
San Diego, CA, February
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2011.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
11
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI'10, 2010.
-
(2010)
OSDI'10
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
12
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. Riskranker: scalable and accurate zero-day android malware detection. In MobiSys '12, 2012.
-
(2012)
MobiSys '12
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
14
-
-
84866721423
-
DTA++: Dynamic taint analysis with targeted control-flow propagation
-
M. G. Kang, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic taint analysis with targeted control-flow propagation. In NDSS '11, 2011.
-
(2011)
NDSS '11
-
-
Kang, M.G.1
McCamant, S.2
Poosankam, P.3
Song, D.4
-
15
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions. In SOSP '07, 2007.
-
(2007)
SOSP '07
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
16
-
-
84984039280
-
Hints for computer system design
-
Oct.
-
B. W. Lampson. Hints for computer system design. SIGOPS Oper. Syst. Rev., 17(5):33-48, Oct. 1983.
-
(1983)
SIGOPS Oper. Syst. Rev.
, vol.17
, Issue.5
, pp. 33-48
-
-
Lampson, B.W.1
-
17
-
-
84881187703
-
Screenpass: Secure password entry on touchscreen devices
-
D. Liu, E. Cuervo, V. Pistol, R. Scudellari, and L. P. Cox. Screenpass: Secure password entry on touchscreen devices. In MobiSys '13, 2013.
-
(2013)
MobiSys '13
-
-
Liu, D.1
Cuervo, E.2
Pistol, V.3
Scudellari, R.4
Cox, L.P.5
-
18
-
-
67650065318
-
Quantitative information flow as network flow capacity
-
June
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. SIGPLAN Not., 43(6):193-205, June 2008.
-
(2008)
SIGPLAN Not.
, vol.43
, Issue.6
, pp. 193-205
-
-
McCamant, S.1
Ernst, M.D.2
-
19
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS '05, 2005.
-
(2005)
NDSS '05
-
-
Newsome, J.1
-
22
-
-
70349160649
-
Pointless tainting? Evaluating the practicality of pointer tainting
-
A. Slowinska and H. Bos. Pointless tainting? evaluating the practicality of pointer tainting. In EuroSys '09, 2009.
-
(2009)
EuroSys '09
-
-
Slowinska, A.1
Bos, H.2
-
24
-
-
84866623952
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In IEEE SP '12, 2012.
-
(2012)
IEEE SP '12
-
-
Zhou, Y.1
Jiang, X.2
|