-
2
-
-
85031690789
-
-
Accessed on November
-
Caffeinemark 3.0. http://www.benchmarkhq.ru/cm30/info.html. Accessed on November 2016.
-
(2016)
-
-
-
3
-
-
85031700826
-
-
random common sentences/. Accessed on August
-
random common sentences. http://www.englishinuse.net/. Accessed on August 2016.
-
(2016)
-
-
-
4
-
-
85031691740
-
-
The reference of android developer. Inputmethodmanger. Accessed on November
-
The reference of android developer. inputmethodmanger. https://developer.android.com/reference/android/view/inputmethod/ InputMethodManager.html. Accessed on November 2016.
-
(2016)
-
-
-
5
-
-
85031696946
-
-
Accessed on November
-
Trustzone, tee and trusted video path implementation. http://www.arm.com/files/event/Developer Track 6 TrustZone TEEs and Trusted Video Path implementation considerations.pdf. Accessed on November 2016.
-
(2016)
Trustzone, Tee and Trusted Video Path Implementation
-
-
-
6
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
Alfred V Aho and Margaret J Corasick. Efficient string matching: an aid to bibliographic search. Communications of the ACM, 18(6):333-340, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 33-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
8
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
Adam J. Aviv, Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. Practicality of accelerometer side channels on smartphones. In Computer Security Applications Conference, pages 41-50, 2012.
-
(2012)
Computer Security Applications Conference
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
9
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
-
Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, and Wenbo Shen. Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world. In ACM Sigsac Conference on Computer and Communications Security, pages 1028-1031, 2014.
-
(2014)
ACM Sigsac Conference on Computer and Communications Security
, pp. 1028-1031
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
10
-
-
84945177387
-
What the app is that?
-
Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, and Giovanni Vigna. What the app is that? deception and countermeasures in the android user interface. pages 931-948, 2015.
-
(2015)
Deception and Countermeasures in the Android User Interface
, pp. 931-948
-
-
Bianchi, A.1
Corbetta, J.2
Invernizzi, L.3
Fratantonio, Y.4
Kruegel, C.5
Vigna, G.6
-
11
-
-
84979895566
-
Regulating arm trustzone devices in restricted spaces
-
ACM
-
Ferdinand Brasser, Daeyoung Kim, Christopher Liebchen, Vinod Ganapathy, Liviu Iftode, and Ahmad-Reza Sadeghi. Regulating arm trustzone devices in restricted spaces. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pages 413-425. ACM, 2016.
-
(2016)
Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services
, pp. 413-425
-
-
Brasser, F.1
Kim, D.2
Liebchen, C.3
Ganapathy, V.4
Iftode, L.5
Sadeghi, A.6
-
12
-
-
85031668420
-
You shouldn't collect my secrets: Thwarting sensitive keystroke leakage in mobile ime apps
-
Jin Chen, Haibo Chen, Erick Bauman, Zhiqiang Lin, Binyu Zang, and Haibing Guan. You shouldn't collect my secrets: thwarting sensitive keystroke leakage in mobile ime apps. In Usenix Conference on Security Symposium, 2015.
-
(2015)
Usenix Conference on Security Symposium
-
-
Chen, J.1
Chen, H.2
Bauman, E.3
Lin, Z.4
Zang, B.5
Guan, H.6
-
13
-
-
85026653947
-
-
Landon P. Cox, Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, and Sai Cheemalapati. Spandex: Secure password tracking for android. 2014.
-
(2014)
Spandex: Secure Password Tracking for Android
-
-
Cox, L.P.1
Gilbert, P.2
Lawler, G.3
Pistol, V.4
Razeen, A.5
Wu, B.6
Cheemalapati, S.7
-
14
-
-
85031675940
-
-
Inputconnection
-
Android Developer. Inputconnection. https://developer.android.com/ reference/android/view/inputmethod/InputConnection.html/.
-
-
-
-
15
-
-
85031696762
-
-
Windowmanager
-
Android Developer. Windowmanager. https://developer.android.com/ reference/android/view/WindowManager.html/.
-
-
-
-
16
-
-
85076889619
-
Taintdroid: An information flow tracking system for real-time privacy monitoring on smartphones
-
William Enck, Peter Gilbert, Byung Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick Mcdaniel, and Anmol N. Sheth. Taintdroid: an information flow tracking system for real-time privacy monitoring on smartphones. In Usenix Conference on Operating Systems Design & Implementation, pages 393-407, 2015.
-
(2015)
Usenix Conference on Operating Systems Design & Implementation
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.N.7
-
18
-
-
84954115060
-
From system services freezing to system server shutdown in android: All you need is a loop in an app
-
Heqing Huang, Sencun Zhu, Kai Chen, and Peng Liu. From system services freezing to system server shutdown in android: All you need is a loop in an app. In The ACM Sigsac Conference, pages 1236-1247, 2015.
-
(2015)
The ACM Sigsac Conference
, pp. 1236-1247
-
-
Huang, H.1
Zhu, S.2
Chen, K.3
Liu, P.4
-
19
-
-
84979682861
-
Supor: Precise and scalable sensitive user input detection for android apps
-
Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. Supor: Precise and scalable sensitive user input detection for android apps. In 24th USENIX Security Symposium (USENIX Security 15), pages 977-992, 2015.
-
(2015)
24th USENIX Security Symposium (USENIX Security 15)
, pp. 977-992
-
-
Huang, J.1
Li, Z.2
Xiao, X.3
Wu, Z.4
Lu, K.5
Zhang, X.6
Jiang, G.7
-
20
-
-
85128201272
-
Secret: Secure channel between rich execution environment and trusted execution environment
-
Jinsoo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, and Brent Byunghoon Kang. Secret: Secure channel between rich execution environment and trusted execution environment. In Network and Distributed System Security Symposium, 2015.
-
(2015)
Network and Distributed System Security Symposium
-
-
Jang, J.1
Kong, S.2
Kim, M.3
Kim, D.4
Byunghoon Kang, B.5
-
21
-
-
84900035357
-
Dta++: Dynamic taint analysis with targeted control-flow propagation
-
San Diego, California, Usa, February-February
-
Min Gyung Kang, Stephen Mccamant, Pongsin Poosankam, and Dawn Song. Dta++: Dynamic taint analysis with targeted control-flow propagation. In Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, Usa, February-February, 2011.
-
(2011)
Network and Distributed System Security Symposium, NDSS 2011
-
-
Gyung Kang, M.1
Mccamant, S.2
Poosankam, P.3
Song, D.4
-
23
-
-
84954195489
-
Adattester: Secure online mobile advertisement attestation using trustzone
-
Wenhao Li, Haibo Li, Haibo Chen, and Yubin Xia. Adattester: Secure online mobile advertisement attestation using trustzone. In The International Conference on Mobile Systems, Applications, and Services, pages 15-26, 2015.
-
(2015)
The International Conference on Mobile Systems, Applications, and Services
, pp. 15-26
-
-
Li, W.1
Li, H.2
Chen, H.3
Xia, Y.4
-
24
-
-
84951766822
-
Screenmilker: How to milk your android screen for secrets
-
Chia-Chi Lin, Hongyang Li, Xiao-yong Zhou, and XiaoFeng Wang. Screenmilker: How to milk your android screen for secrets. In NDSS, 2014.
-
(2014)
NDSS
-
-
Lin, C.1
Li, H.2
Zhou, X.3
Wang, X.4
-
25
-
-
84881187703
-
Screenpass: Secure password entry on touchscreen devices
-
Dongtao Liu, Eduardo Cuervo, Valentin Pistol, Ryan Scudellari, and Landon P. Cox. Screenpass: secure password entry on touchscreen devices. In Proceeding of the International Conference on Mobile Systems, Applications, and Services, pages 291-304, 2013.
-
(2013)
Proceeding of the International Conference on Mobile Systems, Applications, and Services
, pp. 291-304
-
-
Liu, D.1
Cuervo, E.2
Pistol, V.3
Scudellari, R.4
Cox, L.P.5
-
26
-
-
85133408027
-
Smartphones as practical and secure location verification tokens for payments
-
Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan apkun. Smartphones as practical and secure location verification tokens for payments. In Network and Distributed System Security Symposium, 2014.
-
(2014)
Network and Distributed System Security Symposium
-
-
Marforio, C.1
Karapanos, N.2
Soriente, C.3
Kostiainen, K.4
Apkun, S.5
-
28
-
-
85030791452
-
Towards discovering and understanding task hijacking in android
-
Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, and Peng Liu. Towards discovering and understanding task hijacking in android. In Usenix Conference on Security Symposium, 2015.
-
(2015)
Usenix Conference on Security Symposium
-
-
Ren, C.1
Zhang, Y.2
Xue, H.3
Wei, T.4
Liu, P.5
-
29
-
-
85143079149
-
Kratos: Discovering inconsistent security policy enforcement in the android framework
-
Yuru Shao, Jason Ott, Qi Alfred Chen, Zhiyun Qian, and Z Morley Mao. Kratos: Discovering inconsistent security policy enforcement in the android framework. In Proc. 23rd Annual Network and Distributed System Security Symposium (NDSS16). ISOC, 2016.
-
(2016)
Proc. 23rd Annual Network and Distributed System Security Symposium (NDSS16). ISOC
-
-
Shao, Y.1
Ott, J.2
Alfred Chen, Q.3
Qian, Z.4
Morley Mao, Z.5
-
30
-
-
84901246064
-
Evolution, detection and analysis of malware for smart devices
-
Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, and Arturo Ribagorda. Evolution, detection and analysis of malware for smart devices. IEEE Communications Surveys & Tutorials, 16(2):961-987, 2013.
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.2
, pp. 61-987
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris-Lopez, P.3
Ribagorda, A.4
-
31
-
-
84954087999
-
Trustotp: Transforming smartphones into secure one-time password tokens
-
He Sun, Kun Sun, Yuewu Wang, and Jiwu Jing. Trustotp: Transforming smartphones into secure one-time password tokens. In ACM Sigsac Conference on Computer and Communications Security, pages 976-988, 2015.
-
(2015)
ACM Sigsac Conference on Computer and Communications Security
, pp. 976-988
-
-
Sun, H.1
Sun, K.2
Wang, Y.3
Jing, J.4
-
33
-
-
84950138855
-
Trustice: Hardware-assisted isolated computing environments on mobile devices
-
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, and Haining Wang. Trustice: Hardware-assisted isolated computing environments on mobile devices. In Ieee/ifip International Conference on Dependable Systems and Networks, pages 367-378, 2015.
-
(2015)
Ieee/ifip International Conference on Dependable Systems and Networks
, pp. 367-378
-
-
Sun, H.1
Sun, K.2
Wang, Y.3
Jing, J.4
Wang, H.5
-
34
-
-
84945190750
-
Leave me alone: App-level protection against runtime information gathering on android
-
IEEE
-
Nan Zhang, Kan Yuan, Muhammad Naveed, Xiaoyong Zhou, and XiaoFeng Wang. Leave me alone: App-level protection against runtime information gathering on android. In 2015 IEEE Symposium on Security and Privacy, pages 915-930. IEEE, 2015.
-
(2015)
2015 IEEE Symposium on Security and Privacy
, pp. 915-930
-
-
Zhang, N.1
Yuan, K.2
Naveed, M.3
Zhou, X.4
Wang, X.5
-
35
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Yajin Zhou and Xuxian Jiang. Dissecting android malware: Characterization and evolution. In IEEE Symposium on Security & Privacy, pages 95-109, 2012.
-
(2012)
IEEE Symposium on Security & Privacy
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
36
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
IEEE
-
Zongwei Zhou, Virgil D Gligor, James Newsome, and Jonathan M McCune. Building verifiable trusted path on commodity x86 computers. In 2012 IEEE Symposium on Security and Privacy, pages 616-630. IEEE, 2012.
-
(2012)
2012 IEEE Symposium on Security and Privacy
, pp. 616-630
-
-
Zhou, Z.1
Gligor, V.D.2
Newsome, J.3
McCune, J.M.4
|