메뉴 건너뛰기




Volumn , Issue , 2015, Pages 675-690

You shouldn’t collect my secrets: Thwarting sensitive keystroke leakage in mobile IME apps

Author keywords

[No Author keywords available]

Indexed keywords

TOUCH SCREENS;

EID: 85031668420     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (51)
  • 1
    • 85076263827 scopus 로고    scopus 로고
    • Free Chinese-made software poses security risk. http://www.japantimes.co.jp/news/2013/12/26/national/chinesemade-computer-input-system-banned-in-government-agencies/#.U21w5 aPUS0.
    • Free Chinese-Made Software Poses Security Risk
  • 3
    • 84943160621 scopus 로고    scopus 로고
    • Security enhancements in jelly bean. http://androiddevelopers.blogspot.jp/2013/02/security-enhancements-injelly-bean.html, 2013.
    • (2013) Security Enhancements in Jelly Bean
  • 4
    • 84872119987 scopus 로고    scopus 로고
    • Practicality of accelerometer side channels on smartphones
    • A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith. Practicality of accelerometer side channels on smartphones. In ACSAC, 2012.
    • (2012) ACSAC
    • Aviv, A.J.1    Sapp, B.2    Blaze, M.3    Smith, J.M.4
  • 6
    • 70349275455 scopus 로고    scopus 로고
    • Enforcing authorization policies using transactional memory introspection
    • A. Birgisson, M. Dhawan, U. Erlingsson, V. Ganapathy, and L. Iftode. Enforcing authorization policies using transactional memory introspection. In CCS, pages 223–234, 2008.
    • (2008) CCS , pp. 223-234
    • Birgisson, A.1    Dhawan, M.2    Erlingsson, U.3    Ganapathy, V.4    Iftode, L.5
  • 7
    • 84870682965 scopus 로고    scopus 로고
    • Protecting confidential data on personal computers with storage capsules
    • K. Borders, E. Vander Weele, B. Lau, and A. Prakash. Protecting confidential data on personal computers with storage capsules. In Usenix Security, 2009.
    • (2009) Usenix Security
    • Borders, K.1    Vander Weele, E.2    Lau, B.3    Prakash, A.4
  • 9
    • 84970901426 scopus 로고    scopus 로고
    • Touchlogger: Inferring keystrokes on touch screen from smartphone motion
    • L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In HotSec, 2011.
    • (2011) HotSec
    • Cai, L.1    Chen, H.2
  • 10
    • 85076269453 scopus 로고    scopus 로고
    • The case for mobile forensics of private data leaks: Towards large-scale user-oriented privacy protection
    • J. J. K. Chan, K. W. Tan, L. Jiang, and R. K. Balan. The case for mobile forensics of private data leaks: Towards large-scale user-oriented privacy protection. In APSYS, 2013.
    • (2013) APSYS
    • Chan, J.J.K.1    Tan, K.W.2    Jiang, L.3    Balan, R.K.4
  • 11
    • 77955197190 scopus 로고    scopus 로고
    • Side-channel leaks in web applications: A reality today, a challenge tomorrow
    • S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Oakland, pages 191–206, 2010.
    • (2010) Oakland , pp. 191-206
    • Chen, S.1    Wang, R.2    Wang, X.3    Zhang, K.4
  • 12
    • 79961035117 scopus 로고    scopus 로고
    • Analyzing inter-application communication in android
    • E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In MobiSys, pages 239–252. ACM, 2011.
    • (2011) MobiSys , pp. 239-252
    • Chin, E.1    Felt, A.P.2    Greenwood, K.3    Wagner, D.4
  • 15
    • 84888331381 scopus 로고    scopus 로고
    • PIOS: Detecting privacy leaks in ios applications
    • M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting privacy leaks in ios applications. In NDSS, 2011.
    • (2011) NDSS
    • Egele, M.1    Kruegel, C.2    Kirda, E.3    Vigna, G.4
  • 16
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.3    Cox, L.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 18
    • 84858758065 scopus 로고    scopus 로고
    • VX32: Lightweight user-level sandboxing on the x86
    • B. Ford and R. Cox. Vx32: Lightweight user-level sandboxing on the x86. In USENIX ATC, 2008.
    • (2008) USENIX ATC
    • Ford, B.1    Cox, R.2
  • 19
    • 0032641892 scopus 로고    scopus 로고
    • Hardening cots software with generic software wrappers
    • T. Fraser, L. Badger, and M. Feldman. Hardening cots software with generic software wrappers. In Oakland, pages 2–16, 1999.
    • (1999) Oakland , pp. 2-16
    • Fraser, T.1    Badger, L.2    Feldman, M.3
  • 20
    • 84877950290 scopus 로고    scopus 로고
    • AndroidLeaks: Automatically detecting potential privacy leaks in android applications on a large scale
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. In Trust, 2012.
    • (2012) Trust
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 21
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applications confining the wily hacker
    • I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications confining the wily hacker. In USENIX Security, 1996.
    • (1996) USENIX Security
    • Goldberg, I.1    Wagner, D.2    Thomas, R.3    Brewer, E.A.4
  • 22
    • 85165758676 scopus 로고    scopus 로고
    • Systematic detection of capability leaks in stock android smartphones
    • M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In NDSS, 2012.
    • (2012) NDSS
    • Grace, M.1    Zhou, Y.2    Wang, Z.3    Jiang, X.4
  • 23
    • 0024089972 scopus 로고
    • The confused deputy:(or why capabilities might have been invented)
    • N. Hardy. The confused deputy:(or why capabilities might have been invented). SIGOPS Oper. Sys. Review, 22(4):36–38, 1988.
    • (1988) SIGOPS Oper. Sys. Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 24
    • 80755187778 scopus 로고    scopus 로고
    • These aren’t the droids you’re looking for: Retrofitting android to protect data from imperious applications
    • P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren’t the droids you’re looking for: Retrofitting android to protect data from imperious applications. In CCS, 2011.
    • (2011) CCS
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 25
    • 85076301202 scopus 로고    scopus 로고
    • Txbox: Building secure, efficient sandboxes with system transactions
    • S. Jana, D. E. Porter, and V. Shmatikov. Txbox: Building secure, efficient sandboxes with system transactions. In Oakland, 2011.
    • (2011) Oakland
    • Jana, S.1    Porter, D.E.2    Shmatikov, V.3
  • 26
    • 82655169672 scopus 로고    scopus 로고
    • Intrusion recovery using selective re-execution
    • T. Kim, X. Wang, N. Zeldovich, M. Kaashoek, et al. Intrusion recovery using selective re-execution. In OSDI, 2010.
    • (2010) OSDI
    • Kim, T.1    Wang, X.2    Zeldovich, N.3    Kaashoek, M.4
  • 27
    • 85077193678 scopus 로고    scopus 로고
    • Practical and effective sandboxing for non-root users
    • T. Kim and N. Zeldovich. Practical and effective sandboxing for non-root users. In USENIX ATC, pages 139–144, 2013.
    • (2013) USENIX ATC , pp. 139-144
    • Kim, T.1    Zeldovich, N.2
  • 28
    • 85160681664 scopus 로고    scopus 로고
    • Transparent checkpoint-restart of multiple processes on commodity operating systems
    • O. Laadan and J. Nieh. Transparent checkpoint-restart of multiple processes on commodity operating systems. In USENIX ATC, pages 323–336, 2007.
    • (2007) USENIX ATC , pp. 323-336
    • Laadan, O.1    Nieh, J.2
  • 31
    • 84881187703 scopus 로고    scopus 로고
    • Screen-pass: Secure password entry on touchscreen devices
    • D. Liu, E. Cuervo, V. Pistol, R. Scudellari, and L. P. Cox. Screen-pass: Secure password entry on touchscreen devices. In MobiSys, pages 291–304, 2013.
    • (2013) MobiSys , pp. 291-304
    • Liu, D.1    Cuervo, E.2    Pistol, V.3    Scudellari, R.4    Cox, L.P.5
  • 32
    • 77954487766 scopus 로고    scopus 로고
    • APEX: Extending android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In ASIACCS, pages 328–332, 2010.
    • (2010) ASIACCS , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 35
    • 84874835750 scopus 로고    scopus 로고
    • Appprofiler: A flexible method of exposing privacy-related behavior in android applications to end users
    • S. Rosen, Z. Qian, and Z. M. Mao. Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users. In ACM conference on Data and application security and privacy, pages 221–232. ACM, 2013.
    • (2013) ACM Conference on Data and Application Security and Privacy , pp. 221-232
    • Rosen, S.1    Qian, Z.2    Mao, Z.M.3
  • 41
    • 84880265063 scopus 로고    scopus 로고
    • Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks
    • Y. Xia, Y. Liu, and H. Chen. Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks. In HPCA, 2013.
    • (2013) HPCA
    • Xia, Y.1    Liu, Y.2    Chen, H.3
  • 42
    • 84929583133 scopus 로고    scopus 로고
    • Tinman: Eliminating confidential mobile data exposure with security oriented offloading
    • Y. Xia, Y. Liu, C. Tan, M. Ma, H. Guan, B. Zang, and H. Chen. Tinman: eliminating confidential mobile data exposure with security oriented offloading. In EuroSys, 2015.
    • (2015) EuroSys
    • Xia, Y.1    Liu, Y.2    Tan, C.3    Ma, M.4    Guan, H.5    Zang, B.6    Chen, H.7
  • 43
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: Practical policy enforcement for android applications
    • R. Xu, H. Saïdi, and R. Anderson. Aurasium: Practical policy enforcement for android applications. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Xu, R.1    Saïdi, H.2    Anderson, R.3
  • 44
    • 84951807502 scopus 로고    scopus 로고
    • App-context: Differentiating malicious and benign mobile app behaviors using context
    • W. Yang, X. Xiao, B. Andow, S. Li, T. Xie, and W. Enck. App-context: Differentiating malicious and benign mobile app behaviors using context. In ICSE, 2015.
    • (2015) ICSE
    • Yang, W.1    Xiao, X.2    Andow, B.3    Li, S.4    Xie, T.5    Enck, W.6
  • 46
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS, 2007.
    • (2007) CCS
    • Yin, H.1    Song, D.2    Egele, M.3    Kruegel, C.4    Kirda, E.5
  • 47
    • 82655179240 scopus 로고    scopus 로고
    • CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
    • F. Zhang, J. Chen, H. Chen, and B. Zang. Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In SOSP, 2011.
    • (2011) SOSP
    • Zhang, F.1    Chen, J.2    Chen, H.3    Zang, B.4
  • 49
    • 85076312715 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Oakland, 2012.
    • (2012) Oakland
    • Zhou, Y.1    Jiang, X.2
  • 50
    • 85102224279 scopus 로고    scopus 로고
    • Detecting passive content leaks and pollution in android applications
    • Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In NDSS, 2013.
    • (2013) NDSS
    • Zhou, Y.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.