메뉴 건너뛰기




Volumn 6531 LNCS, Issue , 2011, Pages 346-360

Privilege escalation attacks on android

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; ANDROID (OPERATING SYSTEM); APPLICATION PROGRAMS; MALWARE; SECURITY OF DATA;

EID: 85037073388     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-18178-8_30     Document Type: Conference Paper
Times cited : (277)

References (32)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • One, A.: Smashing the stack for fun and profit. Phrack Magazine 49(14) (1996)
    • (1996) Phrack Magazine , vol.49 , Issue.14
    • One, A.1
  • 2
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to Android
    • October
    • Barrera, D., Kayacik, H.G., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: ACM CCS 2010 (October 2010)
    • (2010) ACM CCS 2010
    • Barrera, D.1    Kayacik, H.G.2    Van Oorschot, P.3    Somayaji, A.4
  • 5
    • 0035017559 scopus 로고    scopus 로고
    • RAD: A compile-time solution to buffer overflow attacks
    • IEEE Computer Society, Los Alamitos
    • Chiueh, T., Hsu, F.-H.: RAD: A compile-time solution to buffer overflow attacks. In: International Conference on Distributed Computing Systems, pp. 409-417. IEEE Computer Society, Los Alamitos (2001)
    • (2001) International Conference on Distributed Computing Systems , pp. 409-417
    • Chiueh, T.1    Hsu, F.-H.2
  • 11
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • ACM, New York
    • Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: ACM CCS 2009, pp. 235-245. ACM, New York (2009)
    • (2009) ACM CCS 2009 , pp. 235-245
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 13
    • 77953603182 scopus 로고    scopus 로고
    • Dynamic code instrumentation to detect and recover from return address corruption
    • ACM, New York
    • Gupta, S., Pratap, P., Saran, H., Arun-Kumar, S.: Dynamic code instrumentation to detect and recover from return address corruption. In: WODA 2006, pp. 65-72. ACM, New York (2006)
    • (2006) WODA 2006 , pp. 65-72
    • Gupta, S.1    Pratap, P.2    Saran, H.3    Arun-Kumar, S.4
  • 14
    • 79251558865 scopus 로고    scopus 로고
    • These aren't the permissions you're looking for
    • Lineberry, A., Richardson, D.L., Wyatt, T.: These aren't the permissions you're looking for. In: BlackHat USA 2010 (2010), http://dtors.files.wordpress. com/2010/08/blackhat-2010-slides.pdf
    • (2010) BlackHat USA 2010
    • Lineberry, A.1    Richardson, D.L.2    Wyatt, T.3
  • 16
  • 17
    • 84900633985 scopus 로고    scopus 로고
    • Fuzzing the phone in your phones
    • June
    • Mulliner, C.: Fuzzing the phone in your phones. In: Black Hat USA (June 2009), http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller- FuzzingPhone-PAPER.pdf
    • (2009) Black Hat USA
    • Mulliner, C.1
  • 18
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending Android permission model and enforcement with user-defined runtime constraints
    • ACM, New York
    • Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android permission model and enforcement with user-defined runtime constraints. In: ASIACCS 2010, pp. 328-332. ACM, New York (2010)
    • (2010) ASIACCS 2010 , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 19
    • 77950851532 scopus 로고    scopus 로고
    • Semantically rich application-centric security in Android
    • IEEE Computer Society, Los Alamitos
    • Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in Android. In: ACSAC 2009, pp. 340-349. IEEE Computer Society, Los Alamitos (2009)
    • (2009) ACSAC 2009 , pp. 340-349
    • Ongtang, M.1    McLaughlin, S.2    Enck, W.3    McDaniel, P.4
  • 20
    • 79251587269 scopus 로고    scopus 로고
    • Palm Source, Inc. Version 1
    • Palm Source, Inc. Open Binder. Version 1 (2005), http://www. angryredplanet.com/~hackbod/openbinder/docs/html/index.html
    • (2005) Open Binder
  • 21
    • 79251557269 scopus 로고    scopus 로고
    • PaX Team, http://pax.grsecurity.net/
  • 22
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • Pincus, J., Baker, B.: Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy 2(4), 20-27 (2004)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 25
  • 26
    • 79251548972 scopus 로고    scopus 로고
    • Google Android: A state-of-the-art review of security mechanisms
    • abs/0912.5101
    • Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A state-of-the-art review of security mechanisms. CoRR, abs/0912.5101 (2009)
    • (2009) CoRR
    • Shabtai, A.1    Fledel, Y.2    Kanonov, U.3    Elovici, Y.4    Dolev, S.5
  • 28
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: ACM CCS 2007, pp. 552-561 (2007)
    • (2007) ACM CCS 2007 , pp. 552-561
    • Shacham, H.1
  • 29
    • 78649293466 scopus 로고    scopus 로고
    • A formal model to analyze the permission authorization and enforcement in the Android framework
    • Invited paper
    • Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the Android framework. Invited paper. In: SecureCom 2010 (2010)
    • (2010) SecureCom 2010
    • Shin, W.1    Kiyomoto, S.2    Fukushima, K.3    Tanaka, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.