-
2
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
Oct.
-
BARRERA, D., and KAYACIK., H. G., VAN OORSHOT, P. C., AND SOMAYAJI, A. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android. In Proceedings of the ACM Conference on Computer and Communications Security (Oct. 2010).
-
(2010)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorshot, P.C.3
Somayaji, A.4
-
4
-
-
80755167433
-
XManDroid: A new android evolution to mitigate privilege escalation attacks
-
Technische Universitat Darmstadt, Germany, Apr.
-
BUGIEL, S., DAVI, L., DMITRIENKO, A., FISCHER, T., AND SADEGHI, A.-R. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks. Tech. Rep. TR-2011-04, Technische Universitat Darmstadt, Germany, Apr. 2011.
-
(2011)
Tech. Rep. TR-2011-04
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
5
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
Feb.
-
BUGIEL, S., DAVI, L., DMITRIENKO, A., FISCHER, T., SADEGHI, A.-R., AND SHASTRY, B. Towards taming privilege-escalation attacks on Android. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (Feb. 2012).
-
(2012)
Proceedings of the 19th Annual Network & Distributed System Security Symposium
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
6
-
-
79961035117
-
Analyzing inter-application communication in android
-
CHIN, E., and FELT., A. P., GREENWOOD, K., and WAGNER, D. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys) (2011).
-
(2011)
Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
7
-
-
35248891044
-
Precise analysis of string expressions
-
Springer-Verlag
-
CHRISTENSEN, A. S., MØLLER, A., and SCHWARTZBACH, M. I. Precise analysis of string expressions. In Proc. 10th International Static Analysis Symposium (SAS) (June 2003), Vol. 2694 of LNCS, Springer-Verlag, pp. 1-18. Available from http://www.brics.dk/JSA/.
-
Proc. 10th International Static Analysis Symposium (SAS) (June 2003), Vol. 2694 of LNCS
, pp. 1-18
-
-
Christensen, A.S.1
Møller, A.2
Schwartzbach, M.I.3
-
8
-
-
84856198950
-
Privilege escalation attacks on android
-
Oct.
-
DAVI, L., DMITRIENKO, A., SADEGHI, A.-R., and WINANDY, M. Privilege Escalation Attacks on Android. In Proc. of the 13th Information Security Conference (ISC) (Oct. 2010).
-
(2010)
Proc. Of the 13th Information Security Conference (ISC)
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
9
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
DIETZ, M., SHEKHAR, S., PISETSKY, Y., SHU, A., AND WALLACH, D. S. Quire: Lightweight Provenance for Smart Phone Operating Systems. In 20th USENIX Security Symposium (2011).
-
(2011)
20th USENIX Security Symposium
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
10
-
-
81855220939
-
Defending users against smartphone apps: Techniques and future directions
-
ENCK, W. Defending users against smartphone apps: Techniques and future directions. In ICISS (2011), pp. 49-70.
-
(2011)
ICISS
, pp. 49-70
-
-
Enck, W.1
-
11
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
ENCK, W., GILBERT, P., CHUN, B.-G., and COX., L. P., JUNG, J., MCDANIEL, P., and SHETH, A. N. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of the 9th USENIX Symp. on Operating Systems Design and Implementation (OSDI) (2010).
-
(2010)
Proc. Of the 9th USENIX Symp. Of Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mcdaniel, P.6
Sheth, A.N.7
-
12
-
-
85025700509
-
A study of android application security
-
August
-
ENCK, W., OCTEAU, D., MCDANIEL, P., and CHAUDHURI, S. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium (August 2011).
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Enck, W.1
Octeau, D.2
Mcdaniel, P.3
Chaudhuri, S.4
-
14
-
-
60049085302
-
Understanding android security
-
January/February
-
ENCK, W., ONGTANG, M., and MCDANIEL, P. Understanding Android Security. IEEE Security & Privacy Magazine 7, 1 (January/February 2009), 50-57.
-
(2009)
IEEE Security & Privacy Magazine
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
Mcdaniel, P.3
-
15
-
-
80755187788
-
Android permissions demystified
-
FELT, A. P., CHIN, E., HANNA, S., SONG, D., and WAGNER, D. Android Permissions Demystified. In Proc. of the ACM Conf. on Computer and Communications Security (CCS) (2011).
-
(2011)
Proc. Of the ACM Conf. Of Computer and Communications Security (CCS)
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
17
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
August
-
FELT, A. P., and WANG., H. J., MOSHCHUK, A., HANNA, S., and CHIN, E. Permission Re-Delegation: Attacks and Defenses. In Proc. of the 20th USENIX Security Symp. (August 2011).
-
(2011)
Proc. Of the 20th USENIX Security Symp.
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
18
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app markets
-
GILBERT, P., CHUN, B.-G., and COX., L. P., and JUNG, J. Vision: Automated Security Validation of Mobile Apps at App Markets. In Proceedings of the International Workshop on Mobile Cloud Computing and Services (MCS) (2011).
-
(2011)
Proceedings of the International Workshop on Mobile Cloud Computing and Services (MCS)
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
19
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
GRACE, M., ZHOU, Y., WANG, Z., and JIANG, X. Systematic Detection of Capability Leaks in Stock Android Smartphones. In NDSS '12 (2012).
-
(2012)
NDSS '12
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
20
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
WISEC '12, ACM
-
GRACE, M. C., ZHOU, W., JIANG, X., and SADEGHI, A.-R. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (2012), WISEC '12, ACM.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
21
-
-
0024089972
-
The confused deputy: (or why capabilities might have been invented)
-
Oct.
-
HARDY, N. The confused deputy: (or why capabilities might have been invented). SIGOPS Oper. Syst. Rev. 22, 4 (Oct. 1988).
-
(1988)
SIGOPS Oper. Syst. Rev.
, vol.22
, Issue.4
-
-
Hardy, N.1
-
22
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
HORNYACK, P., HAN, S., JUNG, J., SCHECHTER, S., and WETHERALL, D. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2011).
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
25
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
CCS '12, ACM
-
LU, L., LI, Z., WU, Z., LEE, W., and JIANG, G. Chex: statically vetting android apps for component hijacking vulnerabilities. In Proc. of the 2012 ACM conference on Computer and communications security (2012), CCS '12, ACM, pp. 229-240.
-
(2012)
Proc. Of the 2012 ACM Conference on Computer and Communications Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
26
-
-
77958124029
-
Not so great expectations: Why application markets haven't failed security
-
September/October
-
MCDANIEL, P., and ENCK, W. Not So Great Expectations: Why Application Markets Haven't Failed Security. IEEE Security & Privacy Magazine 8, 5 (September/October 2010), 76-78.
-
(2010)
IEEE Security & Privacy Magazine
, vol.8
, Issue.5
, pp. 76-78
-
-
Mcdaniel, P.1
Enck, W.2
-
28
-
-
84857945430
-
The ded decompiler
-
Network and Security Research Center, Pennsylvania State University, USA, Sept.
-
OCTEAU, D., ENCK, W., and MCDANIEL, P. The ded Decompiler. Tech. Rep. NAS-TR-0140-2010, Network and Security Research Center, Pennsylvania State University, USA, Sept. 2010. Available from http://siis.cse.psu.edu/ded/.
-
(2010)
Tech. Rep. NAS-TR-0140-2010
-
-
Octeau, D.1
Enck, W.2
Mcdaniel, P.3
-
30
-
-
77950851532
-
Semantically rich application-centric security in android
-
Dec.
-
ONGTANG, M., MCLAUGHLIN, S., ENCK, W., and MC-DANIEL, P. Semantically Rich Application-Centric Security in Android. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC) (Dec. 2009), pp. 340-349.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC)
, pp. 340-349
-
-
Ongtang, M.1
Mclaughlin, S.2
Enck, W.3
Mc-Daniel, P.4
-
31
-
-
84967068429
-
Google play hits 25 billion downloads
-
Sept.
-
ROSENBERG, J. Google play hits 25 billion downloads. Android - Official blog, Sept. 2012. Available at http://officialandroid.blogspot.com/2012/09/google-play-hits-25-billion-downloads.html.
-
(2012)
Android - Official Blog
-
-
Rosenberg, J.1
-
32
-
-
0030263395
-
Precise interprocedu-ral dataflow analysis with applications to constant propagation
-
Oct.
-
SAGIV, M., REPS, T., and HORWITZ, S. Precise interprocedu-ral dataflow analysis with applications to constant propagation. Theor. Comput. Sci. 167, 1-2 (Oct. 1996), 131-170.
-
(1996)
Theor. Comput. Sci.
, vol.167
, Issue.1-2
, pp. 131-170
-
-
Sagiv, M.1
Reps, T.2
Horwitz, S.3
-
34
-
-
0002217889
-
Optimizing Java bytecode using the soot framework: Is it feasible?
-
CC '00
-
VALLÉE-RAI, R., GAGNON, E., HENDREN, L. J., LAM, P., POMINVILLE, P., AND SUNDARESAN, V. Optimizing java bytecode using the soot framework: Is it feasible? In Proc. of the 9th International Conf. on Compiler Construction (2000), CC '00.
-
(2000)
Proc. Of the 9th International Conf. Of Compiler Construction
-
-
Vallée-Rai, R.1
Gagnon, E.2
Hendren, L.J.3
Lam, P.4
Pominville, P.5
Sundaresan, V.6
-
35
-
-
84869757378
-
Smartdroid: An automatic system for revealing ui-based trigger conditions in android applications
-
ZHENG, C., ZHU, S., DAI, S., GU, G., GONG, X., HAN, X., and ZOU, W. Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications. In Proceedings of the second ACM workshop on Security and privacy in smart-phones and mobile devices (2012), ACM, pp. 93-104.
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smart-phones and Mobile Devices
, pp. 93-104
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Han, X.6
Zou, W.7
-
36
-
-
85172622386
-
Hey, you, get off of my market: Detecting Malicious apps in official and alternative android markets
-
Feb.
-
ZHOU, Y., WANG, Z., ZHOU, W., and JIANG, X. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the Network and Distributed System Security Symposium (Feb. 2012).
-
(2012)
Proceedings of the Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|