-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
One, A.: Smashing the stack for fun and profit. Phrack Magazine 49(14) (1996)
-
(1996)
Phrack Magazine
, vol.49
, Issue.14
-
-
One, A.1
-
2
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to Android
-
October
-
Barrera, D., Kayacik, H.G., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: ACM CCS 2010 (October 2010)
-
(2010)
ACM CCS 2010
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.3
Somayaji, A.4
-
4
-
-
78650032454
-
Return-oriented programming without returns
-
October
-
Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.-R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: ACM CCS 2010 (October 2010)
-
(2010)
ACM CCS 2010
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
5
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
IEEE Computer Society, Los Alamitos
-
Chiueh, T., Hsu, F.-H.: RAD: A compile-time solution to buffer overflow attacks. In: International Conference on Distributed Computing Systems, pp. 409-417. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
International Conference on Distributed Computing Systems
, pp. 409-417
-
-
Chiueh, T.1
Hsu, F.-H.2
-
7
-
-
78650024047
-
-
Technical Report HGI-TR-2010-002, Ruhr-University Bochum July
-
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Return-oriented programming without returns on ARM. Technical Report HGI-TR-2010-002, Ruhr-University Bochum (July 2010)
-
(2010)
Return-oriented Programming Without Returns on ARM
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
9
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In: USENIX Symposium on Operating Systems Design and Implementation (October 2010)
-
USENIX Symposium on Operating Systems Design and Implementation (October 2010)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
10
-
-
60049083121
-
-
Technical Report NAS-TR-0094-2008, Pennsylvania State University September
-
Enck, W., Ongtang, M., McDaniel, P.: Mitigating Android software misuse before it happens. Technical Report NAS-TR-0094-2008, Pennsylvania State University (September 2008)
-
(2008)
Mitigating Android Software Misuse before It Happens
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
11
-
-
74049155830
-
On lightweight mobile phone application certification
-
ACM, New York
-
Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: ACM CCS 2009, pp. 235-245. ACM, New York (2009)
-
(2009)
ACM CCS 2009
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
12
-
-
60049085302
-
Understanding Android security
-
Enck, W., Ongtang, M., McDaniel, P.: Understanding Android security. IEEE Security and Privacy 7(1), 50-57 (2009)
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
13
-
-
77953603182
-
Dynamic code instrumentation to detect and recover from return address corruption
-
ACM, New York
-
Gupta, S., Pratap, P., Saran, H., Arun-Kumar, S.: Dynamic code instrumentation to detect and recover from return address corruption. In: WODA 2006, pp. 65-72. ACM, New York (2006)
-
(2006)
WODA 2006
, pp. 65-72
-
-
Gupta, S.1
Pratap, P.2
Saran, H.3
Arun-Kumar, S.4
-
14
-
-
79251558865
-
These aren't the permissions you're looking for
-
Lineberry, A., Richardson, D.L., Wyatt, T.: These aren't the permissions you're looking for. In: BlackHat USA 2010 (2010), http://dtors.files.wordpress. com/2010/08/blackhat-2010-slides.pdf
-
(2010)
BlackHat USA 2010
-
-
Lineberry, A.1
Richardson, D.L.2
Wyatt, T.3
-
16
-
-
79960596222
-
-
Moore, H.D.: Cracking the iPhone (2007), http://blog.metasploit.com/2007/ 10/cracking-iphone-part-1.html
-
(2007)
Cracking the iPhone
-
-
Moore, H.D.1
-
17
-
-
84900633985
-
Fuzzing the phone in your phones
-
June
-
Mulliner, C.: Fuzzing the phone in your phones. In: Black Hat USA (June 2009), http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller- FuzzingPhone-PAPER.pdf
-
(2009)
Black Hat USA
-
-
Mulliner, C.1
-
18
-
-
77954487766
-
Apex: Extending Android permission model and enforcement with user-defined runtime constraints
-
ACM, New York
-
Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android permission model and enforcement with user-defined runtime constraints. In: ASIACCS 2010, pp. 328-332. ACM, New York (2010)
-
(2010)
ASIACCS 2010
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
19
-
-
77950851532
-
Semantically rich application-centric security in Android
-
IEEE Computer Society, Los Alamitos
-
Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in Android. In: ACSAC 2009, pp. 340-349. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
ACSAC 2009
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
20
-
-
79251587269
-
-
Palm Source, Inc. Version 1
-
Palm Source, Inc. Open Binder. Version 1 (2005), http://www. angryredplanet.com/~hackbod/openbinder/docs/html/index.html
-
(2005)
Open Binder
-
-
-
21
-
-
79251557269
-
-
PaX Team, http://pax.grsecurity.net/
-
-
-
-
22
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
Pincus, J., Baker, B.: Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy 2(4), 20-27 (2004)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
23
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S., Yildizli, C.: Smartphone malware evolution revisited: Android next target? In: Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pp. 1-7 (2009)
-
(2009)
Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009)
, pp. 1-7
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Batyuk, L.3
Clausen, J.H.4
Camtepe, S.A.5
Albayrak, S.6
Yildizli, C.7
-
24
-
-
84867833971
-
Enhancing security of Linux-based Android devices
-
Schmidt, A.-D., Schmidt, H.-G., Clausen, J., Yuksel, K.A., Kiraz, O., Camtepe, A., Albayrak, S.: Enhancing security of Linux-based Android devices. In: 15th International Linux Kongress, Lehmann (October 2008)
-
15th International Linux Kongress, Lehmann (October 2008)
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Clausen, J.3
Yuksel, K.A.4
Kiraz, O.5
Camtepe, A.6
Albayrak, S.7
-
25
-
-
77950673302
-
Securing Android-powered mobile devices using SELinux
-
Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-powered mobile devices using SELinux. IEEE Security and Privacy 8, 36-44 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 36-44
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
26
-
-
79251548972
-
Google Android: A state-of-the-art review of security mechanisms
-
abs/0912.5101
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A state-of-the-art review of security mechanisms. CoRR, abs/0912.5101 (2009)
-
(2009)
CoRR
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
-
27
-
-
77950675112
-
Google Android: A comprehensive security assessment
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A comprehensive security assessment. IEEE Security and Privacy 8(2), 35-44 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
28
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: ACM CCS 2007, pp. 552-561 (2007)
-
(2007)
ACM CCS 2007
, pp. 552-561
-
-
Shacham, H.1
-
29
-
-
78649293466
-
A formal model to analyze the permission authorization and enforcement in the Android framework
-
Invited paper
-
Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the Android framework. Invited paper. In: SecureCom 2010 (2010)
-
(2010)
SecureCom 2010
-
-
Shin, W.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
30
-
-
70350696147
-
An empirical security study of the native code in the JDK
-
USENIX Association, Berkeley
-
Tan, G., Croft, J.: An empirical security study of the native code in the JDK. In: Proceedings of the 17th Conference on Security Symposium, SS 2008, pp. 365-377. USENIX Association, Berkeley (2008)
-
(2008)
Proceedings of the 17th Conference on Security Symposium, SS 2008
, pp. 365-377
-
-
Tan, G.1
Croft, J.2
|