-
1
-
-
85080466070
-
-
Task and Back Stack. http://developer.android.com/guide/components/tasks-and-back-stack. html.
-
Back Stack
-
-
-
2
-
-
84918549059
-
-
App Manifest. http://developer.android.com/guide/topics/manifest/activity- element. html.
-
App Manifest
-
-
-
3
-
-
85084161908
-
Clickjacking revisited: A perceptual view of UI security
-
AKHAWE, D., HE, W., LI, Z., MOAZZEZI, R., AND SONG, D. Clickjacking Revisited: A Perceptual View of UI Security. In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) (2014).
-
(2014)
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT)
-
-
Akhawe, D.1
He, W.2
Li, Z.3
Moazzezi, R.4
Song, D.5
-
4
-
-
84864339463
-
-
Android Activity. http://developer.android.com/reference/android/app/Activity.html.
-
Android Activity
-
-
-
6
-
-
85178287263
-
Drebin: Effective and explainable detection of android malware in your pocket
-
ARP, D., SPREITZENBARTH, M., HUBNER, M., GASCON, H., AND RIECK, K. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket. In Proceedings of Network and Distributed System Security Symposium (NDSS) (2014).
-
(2014)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
7
-
-
84910671293
-
Oauth demystified for mobile application developers
-
CHEN, E., PEI, Y., CHEN, S., TIAN, Y., KOTCHER, R., AND TAGUE, P. OAuth Demystified for Mobile Application Developers. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2014).
-
(2014)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Chen, E.1
Pei, Y.2
Chen, S.3
Tian, Y.4
Kotcher, R.5
Tague, P.6
-
8
-
-
85047891807
-
Peeking into your app without actually seeing it: UI state inference and novel android attacks
-
CHEN, Q. A., QIAN, Z., AND MAO, Z. M. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. In Proceedings of the USENIX Security Symposium (2014).
-
(2014)
Proceedings of the USENIX Security Symposium
-
-
Chen, Q.A.1
Qian, Z.2
Mao, Z.M.3
-
9
-
-
34548780878
-
A systematic approach to uncover security flaws in GUI logic
-
CHEN, S., MESEGUER, J., SASSE, R., WANG, H., AND WANG, Y. A Systematic Approach to Uncover Security FLaws in GUI Logic. In Proceedings of IEEE Symposium on Security and Privacy (S&P) (2007).
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy (S&P)
-
-
Chen, S.1
Meseguer, J.2
Sasse, R.3
Wang, H.4
Wang, Y.5
-
10
-
-
79961035117
-
Analyzing inter-application communication in android
-
CHIN, E., FELT, A. P., GREENWOOD, K., AND WAGNER, D. Analyzing Inter-Application Communication in Android. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) (2011).
-
(2011)
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
11
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
ENCK, W., GILBERT, P., CHUN, B., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2010).
-
(2010)
Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
12
-
-
80755187788
-
Android permissions demystified
-
FELT, A. P., CHIN, E., HANNA, S., SONG, D., AND WAGNER, D. Android Permissions Demystified. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2011).
-
(2011)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
13
-
-
85046879731
-
Permission Re-delegation: Attacks and defenses
-
FELT, A. P., WANG, H. J., MOSHCHUK, A., HANNA, S., AND CHIN, E. Permission Re-delegation: Attacks and Defenses. In Proceedings of the USENIX Security Symposium (2011).
-
(2011)
Proceedings of the USENIX Security Symposium
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
15
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
GRACE, M., ZHOU, Y., WANG, Z., AND JIANG, X. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of Network and Distributed System Security Symposium (NDSS) (2012).
-
(2012)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
16
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
GRACE, M., ZHOU, Y., ZHANG, Q., ZOU, S., AND JIANG, X. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) (2012).
-
(2012)
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
17
-
-
84940382117
-
Clickjacking: Attacks and defenses
-
HUANG, L., MOSHCHUK, A., WANG, H. J., SCHECHTER, S., AND JACKSON, C. Clickjacking: Attacks and Defenses. In Proceedings of the USENIX Security Symposium (2012).
-
(2012)
Proceedings of the USENIX Security Symposium
-
-
Huang, L.1
Moshchuk, A.2
Wang, H.J.3
Schechter, S.4
Jackson, C.5
-
18
-
-
84910601223
-
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, detection and mitigation
-
JIN, X., HU, X., YING, K., DU, W., AND YIN, H. Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2014).
-
(2014)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Jin, X.1
Hu, X.2
Ying, K.3
Du, W.4
Yin, H.5
-
20
-
-
84869786248
-
Reducing attack surfaces for intra-application communication in android
-
KANTOLA, D., CHIN, E., HE, W., AND WAGNER, D. Reducing attack surfaces for intra-application communication in android. In Proceedings of the ACM workshop on Security and privacy in smartphones and mobile devices (SPSM) (2012).
-
(2012)
Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Kantola, D.1
Chin, E.2
He, W.3
Wagner, D.4
-
21
-
-
84910643420
-
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
-
LI, T., ZHOU, X., XING, L., LEE, Y., NAVEED, M., WANG, X., AND HAN, X. Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2014).
-
(2014)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Li, T.1
Zhou, X.2
Xing, L.3
Lee, Y.4
Naveed, M.5
Wang, X.6
Han, X.7
-
22
-
-
84951766822
-
ScreenMilker: How to milk your android screen for secrets
-
LIN, C., LI, H., ZHOU, X., AND WANG, X. Screenmilker: How to Milk Your Android Screen for Secrets. In Proceedings of Network and Distributed System Security Symposium (NDSS) (2014).
-
(2014)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Lin, C.1
Li, H.2
Zhou, X.3
Wang, X.4
-
23
-
-
84869416020
-
ChEX: Statically vetting android apps for component hijacking vulnerabilities
-
LU, L., LI, Z., WU, Z., LEE, W., AND JIANG, G. CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2012).
-
(2012)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
24
-
-
84862909641
-
Attacks on webView in the android system
-
LUO, T., HAO, H., DU, W., WANG, Y., AND YIN, H. Attacks on WebView in the Android System. In Proceedings of Annual Computer Security Applications Conference (2011).
-
(2011)
Proceedings of Annual Computer Security Applications Conference
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
25
-
-
84864372370
-
Tapprints: Your finger taps have fingerprints
-
MILUZZO, E., VARSHAVSKY, A., AND BALAKRISHNAN, S. TapPrints: Your Finger Taps Have Fingerprints. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) (2012).
-
(2012)
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
-
26
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
PENG, H., GATES, C., SARMA, B., LI, N., QI, Y., POTHARAJU, R., NITA-ROTARU, C., AND MILLOY, I. Using Probabilistic Generative Models for Ranking Risks of Android Apps. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2012).
-
(2012)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Milloy, I.8
-
27
-
-
84961583949
-
Execute This! Analyzing unsafe and malicious dynamic code loading in android applications
-
POEPLAU, S., FRATANTONIO, Y., BIANCHI, A., KRUEGEL, C., AND VIGNA, G. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. In Proceedings of Network and Distributed System Security Symposium (NDSS) (2014).
-
(2014)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Poeplau, S.1
Fratantonio, Y.2
Bianchi, A.3
Kruegel, C.4
Vigna, G.5
-
29
-
-
85084163031
-
Design of the EROS trusted window system
-
SHAPIRO, J., VANDERBURGH, J., NORTHUP, E., AND CHIZMADIA, D. Design of the EROS Trusted Window System. In Proceedings of the USENIX Security Symposium (2004).
-
(2004)
Proceedings of the USENIX Security Symposium
-
-
Shapiro, J.1
Vanderburgh, J.2
Northup, E.3
Chizmadia, D.4
-
30
-
-
85180622320
-
SMV-Hunter: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in android apps
-
SOUNTHIRARAJ, D., SAHS, J., GREENWOOD, G., LIN, Z., AND KHAN, L. SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. In Proceedings of Network and Distributed System Security Symposium (NDSS) (2014).
-
(2014)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Sounthiraraj, D.1
Sahs, J.2
Greenwood, G.3
Lin, Z.4
Khan, L.5
-
31
-
-
84865574920
-
-
Android and Security, 2012. http://googlemobile.blogspot.com/2012/02/android- and- security. html.
-
(2012)
Android and Security
-
-
-
33
-
-
84889012971
-
The impact of vendor customizations on android security
-
WU, L., GRACE, M., ZHOU, Y., WU, C., AND JIANG, X. The Impact of Vendor Customizations on Android Security. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2013).
-
(2013)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Wu, L.1
Grace, M.2
Zhou, Y.3
Wu, C.4
Jiang, X.5
-
35
-
-
84951807502
-
AppContext: Differentiating malicious and benign mobile app behavior under contexts
-
YANG, W., XIAO, X., ANDOW, B., LI, S., XIE, T., AND ENCK, W. AppContext: Differentiating Malicious and Benign Mobile App Behavior under Contexts. In Proceedings of International Conference on Software Engineering (ICSE) (2015).
-
(2015)
Proceedings of International Conference on Software Engineering (ICSE)
-
-
Yang, W.1
Xiao, X.2
Andow, B.3
Li, S.4
Xie, T.5
Enck, W.6
-
36
-
-
85080313072
-
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
-
YANG, Z., YANG, M., ZHANG, Y., GU, G., NING, P., AND WANG, X. S. AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection. In Proc. CCS13.
-
Proc. CCS13.
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
37
-
-
85080447217
-
Semantics-aware android malware classification using weighted contextual API dependency graphs
-
ZHANG, M., DUAN, Y., YIN, H., AND ZHAO, Z. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs. In Proc. CCS14.
-
Proc. CCS14.
-
-
Zhang, M.1
Duan, Y.2
Yin, H.3
Zhao, Z.4
-
38
-
-
84889000328
-
Identity, location, disease and more: Inferring your secrets from android public resources
-
ZHOU, X., DEMETRIOU, S., HE, D., NAVEED, M., PAN, X., WANG, X., GUNTER, C., AND NAHRSTEDT, K. Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources. In Proceedings of ACM Conference on Computer and Communications Security (CCS) (2013).
-
(2013)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
-
-
Zhou, X.1
Demetriou, S.2
He, D.3
Naveed, M.4
Pan, X.5
Wang, X.6
Gunter, C.7
Nahrstedt, K.8
-
41
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
ZHOU, Y., WANG, Z., ZHOU, W., AND JIANG, X. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of Network and Distributed System Security Symposium (NDSS) (2012).
-
(2012)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|