-
1
-
-
78249282277
-
Abusing social networks for automated user profiling
-
page Springer-Verlag New York Inc, 2010
-
M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings, volume 6307, page 422. Springer-Verlag New York Inc, 2010.
-
Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings
, vol.6307
, pp. 422
-
-
Balduzzi, M.1
Platzer, C.2
Holz, T.3
Kirda, E.4
Balzarotti, D.5
Kruegel, C.6
-
3
-
-
85037073388
-
Privilege escalation attacks on android
-
L. Davi, A. Dmitrienko, A. Sadeghi, and M. Winandy. Privilege escalation attacks on android. Information Security, pages 346-360, 2011.
-
(2011)
Information Security
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.3
Winandy, M.4
-
6
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1-6. USENIX Association, 2010.
-
(2010)
Proceedings of the 9th USENIX conference on Operating systems design and implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
9
-
-
60049085302
-
Understanding Android Security
-
W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. Security & Privacy, IEEE, 7(1):50-57, 2009.
-
(2009)
Security & Privacy, IEEE
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
10
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
San Fansisco, CA
-
A. Felt, H. Wang, A. Moshchuk, S. Hanna, E. Chin, K. Greenwood, D. Wagner, D. Song, M. Finifter, J. Weinberger, et al. Permission re-delegation: Attacks and defenses. In 20th Usenix Security Symposium, San Fansisco, CA, 2011.
-
(2011)
20th Usenix Security Symposium
-
-
Felt, A.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
Greenwood, K.6
Wagner, D.7
Song, D.8
Finifter, M.9
Weinberger, J.10
-
11
-
-
85084161244
-
Dos and Don'ts of Client Authentication on the Web
-
pages USENIX Association
-
K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and Don'ts of Client Authentication on the Web. In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, pages 19-19. USENIX Association, 2001.
-
(2001)
Proceedings of the 10th conference on USENIX Security Symposium
, vol.10
, pp. 19-19
-
-
Fu, K.1
Sit, E.2
Smith, K.3
Feamster, N.4
-
12
-
-
85180796344
-
-
[Online; retrieved Aug 21st, 2011]
-
Intrepidus Group. Intrepidus group, 2011. [Online; retrieved Aug 21st, 2011], http://intrepidusgroup.com/insight/2011/08/dropbox-for-android-vulnerability-breakdown/.
-
(2011)
Intrepidus group
-
-
-
13
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems (TOCS), 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems (TOCS)
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
14
-
-
85180772363
-
-
[Online; retrieved Jun 21st, 2011], Online at
-
M. Marlinspike. Website of sslsniff tool, 2011. [Online; retrieved Jun 21st, 2011], Online at http://www. thoughtcrime.org/software/sslsniff.
-
(2011)
Website of sslsniff tool
-
-
Marlinspike, M.1
-
15
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. Communications Magazine, IEEE, 32(9):33-38, 1994.
-
(1994)
Communications Magazine, IEEE
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'o, T.2
-
17
-
-
85180770977
-
-
[Online; retrieved Aug 21st, 2011]
-
Whisper Systems. Whisper systems, 2011. [Online; retrieved Aug 21st, 2011], http://www.whispersys. com/.
-
(2011)
Whisper systems
-
-
-
19
-
-
85180737361
-
-
XMPP Foundation. [Online; retrieved Jun 21st, 2011]
-
XMPP Foundation. XMPP Standard, 2011. [Online; retrieved Jun 21st, 2011], http://xmpp.org/l.
-
(2011)
XMPP Standard
-
-
|