-
1
-
-
85076263827
-
-
Free Chinese-made software poses security risk. http://www.japantimes.co.jp/news/2013/12/26/national/chinesemade-computer-input-system-banned-in-government-agencies/#.U21w5 aPUS0.
-
Free Chinese-Made Software Poses Security Risk
-
-
-
3
-
-
84943160621
-
-
Security enhancements in jelly bean. http://androiddevelopers.blogspot.jp/2013/02/security-enhancements-injelly-bean.html, 2013.
-
(2013)
Security Enhancements in Jelly Bean
-
-
-
4
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith. Practicality of accelerometer side channels on smartphones. In ACSAC, 2012.
-
(2012)
ACSAC
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
6
-
-
70349275455
-
Enforcing authorization policies using transactional memory introspection
-
A. Birgisson, M. Dhawan, U. Erlingsson, V. Ganapathy, and L. Iftode. Enforcing authorization policies using transactional memory introspection. In CCS, pages 223–234, 2008.
-
(2008)
CCS
, pp. 223-234
-
-
Birgisson, A.1
Dhawan, M.2
Erlingsson, U.3
Ganapathy, V.4
Iftode, L.5
-
8
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In NDSS, 2012.
-
(2012)
NDSS
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
9
-
-
84970901426
-
Touchlogger: Inferring keystrokes on touch screen from smartphone motion
-
L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In HotSec, 2011.
-
(2011)
HotSec
-
-
Cai, L.1
Chen, H.2
-
10
-
-
85076269453
-
The case for mobile forensics of private data leaks: Towards large-scale user-oriented privacy protection
-
J. J. K. Chan, K. W. Tan, L. Jiang, and R. K. Balan. The case for mobile forensics of private data leaks: Towards large-scale user-oriented privacy protection. In APSYS, 2013.
-
(2013)
APSYS
-
-
Chan, J.J.K.1
Tan, K.W.2
Jiang, L.3
Balan, R.K.4
-
11
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Oakland, pages 191–206, 2010.
-
(2010)
Oakland
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
12
-
-
79961035117
-
Analyzing inter-application communication in android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In MobiSys, pages 239–252. ACM, 2011.
-
(2011)
MobiSys
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
14
-
-
85026653947
-
Spandex: Secure password tracking for android
-
L. P. Cox, P. Gilbert, G. Lawler, V. Pistol, A. Razeen, B. Wu, and S. Cheemalapati. Spandex: Secure password tracking for android. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Cox, L.P.1
Gilbert, P.2
Lawler, G.3
Pistol, V.4
Razeen, A.5
Wu, B.6
Cheemalapati, S.7
-
15
-
-
84888331381
-
PIOS: Detecting privacy leaks in ios applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting privacy leaks in ios applications. In NDSS, 2011.
-
(2011)
NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
16
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
17
-
-
84904095463
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM TOCS, 32(2):5, 2014.
-
(2014)
ACM TOCS
, vol.32
, Issue.2
, pp. 5
-
-
Enck, W.1
Gilbert, P.2
Han, S.3
Tendulkar, V.4
Chun, B.-G.5
Cox, L.P.6
Jung, J.7
McDaniel, P.8
Sheth, A.N.9
-
18
-
-
84858758065
-
VX32: Lightweight user-level sandboxing on the x86
-
B. Ford and R. Cox. Vx32: Lightweight user-level sandboxing on the x86. In USENIX ATC, 2008.
-
(2008)
USENIX ATC
-
-
Ford, B.1
Cox, R.2
-
19
-
-
0032641892
-
Hardening cots software with generic software wrappers
-
T. Fraser, L. Badger, and M. Feldman. Hardening cots software with generic software wrappers. In Oakland, pages 2–16, 1999.
-
(1999)
Oakland
, pp. 2-16
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
20
-
-
84877950290
-
AndroidLeaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. In Trust, 2012.
-
(2012)
Trust
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
21
-
-
85084162735
-
A secure environment for untrusted helper applications confining the wily hacker
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications confining the wily hacker. In USENIX Security, 1996.
-
(1996)
USENIX Security
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
22
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In NDSS, 2012.
-
(2012)
NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
23
-
-
0024089972
-
The confused deputy:(or why capabilities might have been invented)
-
N. Hardy. The confused deputy:(or why capabilities might have been invented). SIGOPS Oper. Sys. Review, 22(4):36–38, 1988.
-
(1988)
SIGOPS Oper. Sys. Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
24
-
-
80755187778
-
These aren’t the droids you’re looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren’t the droids you’re looking for: Retrofitting android to protect data from imperious applications. In CCS, 2011.
-
(2011)
CCS
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
25
-
-
85076301202
-
Txbox: Building secure, efficient sandboxes with system transactions
-
S. Jana, D. E. Porter, and V. Shmatikov. Txbox: Building secure, efficient sandboxes with system transactions. In Oakland, 2011.
-
(2011)
Oakland
-
-
Jana, S.1
Porter, D.E.2
Shmatikov, V.3
-
27
-
-
85077193678
-
Practical and effective sandboxing for non-root users
-
T. Kim and N. Zeldovich. Practical and effective sandboxing for non-root users. In USENIX ATC, pages 139–144, 2013.
-
(2013)
USENIX ATC
, pp. 139-144
-
-
Kim, T.1
Zeldovich, N.2
-
28
-
-
85160681664
-
Transparent checkpoint-restart of multiple processes on commodity operating systems
-
O. Laadan and J. Nieh. Transparent checkpoint-restart of multiple processes on commodity operating systems. In USENIX ATC, pages 323–336, 2007.
-
(2007)
USENIX ATC
, pp. 323-336
-
-
Laadan, O.1
Nieh, J.2
-
30
-
-
85076688797
-
Πbox: A platform for privacy-preserving apps
-
S. Lee, E. L. Wong, D. Goel, M. Dahlin, and V. Shmatikov. πbox: a platform for privacy-preserving apps. In NSDI, 2013.
-
(2013)
NSDI
-
-
Lee, S.1
Wong, E.L.2
Goel, D.3
Dahlin, M.4
Shmatikov, V.5
-
31
-
-
84881187703
-
Screen-pass: Secure password entry on touchscreen devices
-
D. Liu, E. Cuervo, V. Pistol, R. Scudellari, and L. P. Cox. Screen-pass: Secure password entry on touchscreen devices. In MobiSys, pages 291–304, 2013.
-
(2013)
MobiSys
, pp. 291-304
-
-
Liu, D.1
Cuervo, E.2
Pistol, V.3
Scudellari, R.4
Cox, L.P.5
-
32
-
-
77954487766
-
APEX: Extending android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In ASIACCS, pages 328–332, 2010.
-
(2010)
ASIACCS
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
33
-
-
72249089012
-
Operating system transactions
-
D. E. Porter, O. S. Hofmann, C. J. Rossbach, A. Benn, and E. Witchel. Operating system transactions. In SOSP, 2009.
-
(2009)
SOSP
-
-
Porter, D.E.1
Hofmann, O.S.2
Rossbach, C.J.3
Benn, A.4
Witchel, E.5
-
35
-
-
84874835750
-
Appprofiler: A flexible method of exposing privacy-related behavior in android applications to end users
-
S. Rosen, Z. Qian, and Z. M. Mao. Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users. In ACM conference on Data and application security and privacy, pages 221–232. ACM, 2013.
-
(2013)
ACM Conference on Data and Application Security and Privacy
, pp. 221-232
-
-
Rosen, S.1
Qian, Z.2
Mao, Z.M.3
-
36
-
-
84919816290
-
Reseed: Regular expression search over encrypted data in the cloud
-
M. A. Salehi, T. Caldwell, A. Fernandez, E. Mickiewicz, E. W. Rozier, S. Zonouz, and D. Redberg. Reseed: Regular expression search over encrypted data in the cloud. In CCGrid, 2014.
-
(2014)
CCGrid
-
-
Salehi, M.A.1
Caldwell, T.2
Fernandez, A.3
Mickiewicz, E.4
Rozier, E.W.5
Zonouz, S.6
Redberg, D.7
-
38
-
-
84903733085
-
Investigating user privacy in android ad libraries
-
R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen. Investigating user privacy in android ad libraries. In Workshop on Mobile Security Technologies (MoST), 2012.
-
(2012)
Workshop on Mobile Security Technologies (MoST)
-
-
Stevens, R.1
Gibler, C.2
Crussell, J.3
Erickson, J.4
Chen, H.5
-
41
-
-
84880265063
-
Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks
-
Y. Xia, Y. Liu, and H. Chen. Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks. In HPCA, 2013.
-
(2013)
HPCA
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
-
42
-
-
84929583133
-
Tinman: Eliminating confidential mobile data exposure with security oriented offloading
-
Y. Xia, Y. Liu, C. Tan, M. Ma, H. Guan, B. Zang, and H. Chen. Tinman: eliminating confidential mobile data exposure with security oriented offloading. In EuroSys, 2015.
-
(2015)
EuroSys
-
-
Xia, Y.1
Liu, Y.2
Tan, C.3
Ma, M.4
Guan, H.5
Zang, B.6
Chen, H.7
-
43
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
R. Xu, H. Saïdi, and R. Anderson. Aurasium: Practical policy enforcement for android applications. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Xu, R.1
Saïdi, H.2
Anderson, R.3
-
44
-
-
84951807502
-
App-context: Differentiating malicious and benign mobile app behaviors using context
-
W. Yang, X. Xiao, B. Andow, S. Li, T. Xie, and W. Enck. App-context: Differentiating malicious and benign mobile app behaviors using context. In ICSE, 2015.
-
(2015)
ICSE
-
-
Yang, W.1
Xiao, X.2
Andow, B.3
Li, S.4
Xie, T.5
Enck, W.6
-
45
-
-
73649126934
-
Native client: A sandbox for portable, untrusted x86 native code
-
Jan
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. Commun. ACM, 53(1):91–99, Jan. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.1
, pp. 91-99
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
46
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS, 2007.
-
(2007)
CCS
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
47
-
-
82655179240
-
CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
F. Zhang, J. Chen, H. Chen, and B. Zang. Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In SOSP, 2011.
-
(2011)
SOSP
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
-
48
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In ACM conference on Data and Application Security and Privacy, pages 317–326. ACM, 2012.
-
(2012)
ACM Conference on Data and Application Security and Privacy
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
49
-
-
85076312715
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Oakland, 2012.
-
(2012)
Oakland
-
-
Zhou, Y.1
Jiang, X.2
-
50
-
-
85102224279
-
Detecting passive content leaks and pollution in android applications
-
Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In NDSS, 2013.
-
(2013)
NDSS
-
-
Zhou, Y.1
Jiang, X.2
|