-
1
-
-
84871278310
-
Automated concolic testing of smartphone apps
-
S. Anand, M. Naik, H. Yang, and M. Harrold, “Automated concolic testing of smartphone apps, ” in Proc. of FSE, 2012.
-
(2012)
Proc. of FSE
-
-
Anand, S.1
Naik, M.2
Yang, H.3
Harrold, M.4
-
2
-
-
84873821798
-
-
Android
-
Android, “Android developer reference, ” http://developer.android.com/reference/packages.html.
-
Android developer reference
-
-
-
3
-
-
84883120881
-
-
Android
-
Android, “Monkeyrunner, ” http://developer.android.com/tools/help/monkeyrunner_concepts.html.
-
Monkeyrunner
-
-
-
6
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
F. Bellard, “QEMU, a fast and portable dynamic translator, ” in Proc. of USENIX ATC, 2005.
-
(2005)
Proc. of USENIX ATC
-
-
Bellard, F.1
-
7
-
-
77957939810
-
Dalvik VM internals
-
D. Bornstein, “Dalvik VM internals, ” in Google I/O, 2008.
-
(2008)
Google I/O
-
-
Bornstein, D.1
-
8
-
-
77954996346
-
Automatically identifying trigger-based behavior in malware
-
D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin, “Automatically identifying trigger-based behavior in malware, ” Botnet Detection, 2008.
-
(2008)
Botnet Detection
-
-
Brumley, D.1
Hartwig, C.2
Liang, Z.3
Newsome, J.4
Song, D.5
Yin, H.6
-
9
-
-
67650790221
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D. R. Engler, “Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, ” in OSDI, 2008.
-
(2008)
OSDI
-
-
Cadar, C.1
Dunbar, D.2
Engler, D. R.3
-
10
-
-
70349141059
-
On the limits of information flow techniques for malware analysis and containment
-
L. Cavallaro, P. Saxena, and R. Sekar, “On the limits of information flow techniques for malware analysis and containment, ” in DIMVA, 2008.
-
(2008)
DIMVA
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
13
-
-
85180555201
-
-
A. Developers, “Parcelable, ” http://developer.android.com/reference/android/os/Parcelable.html.
-
Parcelable
-
-
Developers, A.1
-
14
-
-
79955570859
-
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth, “Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones, ” in USENIX OSDI, 2010.
-
(2010)
USENIX OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
15
-
-
85025700509
-
A study of android application security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security, ” in USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
16
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone application certification, ” in ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
17
-
-
60049085302
-
Understanding android security
-
Jan. [Online]. Available
-
W. Enck, M. Ongtang, and P. McDaniel, “Understanding android security, ” IEEE Security and Privacy, vol. 7, no. 1, pp. 50-57, Jan. 2009. [Online]. Available: http://dx.doi.org/10.1109/MSP.2009.26
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
18
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified, ” in Proc. of CCS, 2011.
-
(2011)
Proc. of CCS
-
-
Felt, A. P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
20
-
-
85080362568
-
A Virtual Machine Introspection Based Architecture for Intrusion Detection
-
T. Garfinkel and M. Rosenblum, “A Virtual Machine Introspection Based Architecture for Intrusion Detection, ” in Proc. of NDSS, 2003.
-
(2003)
Proc. of NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
21
-
-
84958626651
-
Pup-petdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications
-
abs/1402.4826
-
A. Gianazza, F. Maggi, A. Fattori, L. Cavallaro, and S. Zanero, “Pup-petdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications, ” CoRR, vol. abs/1402.4826, 2014.
-
(2014)
CoRR
-
-
Gianazza, A.1
Maggi, F.2
Fattori, A.3
Cavallaro, L.4
Zanero, S.5
-
22
-
-
84888999727
-
Juxtapp: A scalable system for detecting code reuse among android applications
-
S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song, “Juxtapp: A scalable system for detecting code reuse among android applications, ” in Proc. of DIMVA, 2012.
-
(2012)
Proc. of DIMVA
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
24
-
-
85180546689
-
-
Iseclab
-
Iseclab, “Anubis, ” http://anubis.iseclab.org.
-
Anubis
-
-
-
27
-
-
78650024495
-
AccessMiner: Using system-centric models for malware protection
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, “AccessMiner: Using system-centric models for malware protection, ” in Proc. of CCS, 2010.
-
(2010)
Proc. of CCS
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
28
-
-
84968718794
-
Andrubis - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors
-
M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, and C. Platzer, “Andrubis - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors, ” in Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014.
-
(2014)
Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
-
-
Lindorfer, M.1
Neugschwandtner, M.2
Weichselbaum, L.3
Fratantonio, Y.4
van der Veen, V.5
Platzer, C.6
-
29
-
-
85092858716
-
-
H. Lockheimer, “Bouncer, ” http://googlemobile.blogspot.it/2012/02/android-and-security.html.
-
Bouncer
-
-
Lockheimer, H.1
-
30
-
-
85180550280
-
-
McAfee, “Mcafee, ” http://www.mcafee.com.
-
Mcafee
-
-
-
32
-
-
84868107162
-
Dissecting the Android's Bouncer
-
J. Oberheide and C. Miller, “Dissecting the Android's Bouncer, ” Sum-merCon, 2012, http://jon.oberheide.org/files/summercon12-bouncer.pdf.
-
(2012)
Sum-merCon
-
-
Oberheide, J.1
Miller, C.2
-
33
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, “Using probabilistic generative models for ranking risks of android apps, ” in ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
35
-
-
84874865861
-
Appsplayground: Automatic security analysis of smartphone applications
-
New York, NY, USA: ACM
-
V. Rastogi, Y. Chen, and W. Enck, “Appsplayground: Automatic security analysis of smartphone applications, ” in Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY'13. New York, NY, USA: ACM, 2013.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY'13
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
37
-
-
84887633886
-
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
-
Jul
-
G. Sarwar, O. Mehani, R. Boreli, and M. A. Kaafar, “On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices, ” in SECRYPT, Jul. 2013.
-
(2013)
SECRYPT
-
-
Sarwar, G.1
Mehani, O.2
Boreli, R.3
Kaafar, M. A.4
-
38
-
-
70349160649
-
Pointless tainting?: evaluating the practicality of pointer tainting
-
W. Schröder-Preikschat, J. Wilkes, and R. Isaacs, Eds. ACM
-
A. Slowinska and H. Bos, “Pointless tainting?: evaluating the practicality of pointer tainting, ” in EuroSys, W. Schröder-Preikschat, J. Wilkes, and R. Isaacs, Eds. ACM, 2009, pp. 61-74.
-
(2009)
EuroSys
, pp. 61-74
-
-
Slowinska, A.1
Bos, H.2
-
40
-
-
85180545804
-
-
The Honeynet Project, “Droidbox, ” https://code.google.com/p/droidbox/.
-
Droidbox
-
-
-
41
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
C. Willems, T. Holz, and F. Freiling, “Toward automated dynamic malware analysis using cwsandbox, ” IEEE S&P, 2007.
-
(2007)
IEEE S&P
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
42
-
-
85047887956
-
Aurasium: Practical policy enforcement for android applications
-
R. Xu, H. Saıdi, and R. Anderson, “Aurasium: Practical policy enforcement for android applications, ” in Proc. of USENIX Security, 2012.
-
(2012)
Proc. of USENIX Security
-
-
Xu, R.1
Saıdi, H.2
Anderson, R.3
-
43
-
-
85060493868
-
DroidScope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis
-
L.-K. Yan and H. Yin, “DroidScope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, ” in Proc. of USENIX Security, 2012.
-
(2012)
Proc. of USENIX Security
-
-
Yan, L.-K.1
Yin, H.2
-
44
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang, “Vetting undesirable behaviors in android apps with permission use analysis, ” in ACM CCS, 2013.
-
(2013)
ACM CCS
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
Gu, G.5
Ning, P.6
Wang, X. S.7
Zang, B.8
-
45
-
-
84995413501
-
SmartDroid: an automatic system for revealing UI-based trigger conditions in Android applications
-
C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou, “SmartDroid: an automatic system for revealing UI-based trigger conditions in Android applications, ” in Proc. of SPSM, 2012.
-
(2012)
Proc. of SPSM
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Han, X.6
Zou, W.7
-
46
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, “Detecting repackaged smartphone applications in third-party android marketplaces, ” in Proc. of CODASPY, 2012.
-
(2012)
Proc. of CODASPY
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
48
-
-
84869439259
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, ” in Proc. of NDSS, 2012.
-
(2012)
Proc. of NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|