-
3
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
DIETZ, M., SHEKHAR, S., PISETSKY, Y., SHU, A., AND WALLACH, D. S. Quire: Lightweight Provenance for Smart Phone Operating Systems. In 20th USENIX Security Symposium (2011).
-
(2011)
20th USENIX Security Symposium
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.S.5
-
6
-
-
85040311219
-
-
FACEBOOK. Social Plugins. https://developers.facebook.com/docs/plugins/.
-
Social Plugins
-
-
-
8
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
FELT, A. P., HA, E., EGELMAN, S., HANEY, A., CHIN, E., and WAGNER, D. Android permissions: user attention, comprehension, and behavior. In 8th Symposium on Usable Privacy and Security (2012).
-
(2012)
8th Symposium on Usable Privacy and Security
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
10
-
-
85076271034
-
-
GOOGLE. AdMob Ads SDK. https://developers.google.com/mobile-ads-sdk/.
-
AdMob Ads SDK
-
-
-
11
-
-
84940382117
-
Clickjacking: Attacks and defenses
-
HUANG, L.-S., MOSHCHUK, A., and WANG., H. J., SCHECHTER, S., and JACKSON, C. Clickjacking: Attacks and Defenses. In 21st USENIX Security Symposium (2012).
-
(2012)
21st USENIX Security Symposium
-
-
Huang, L.-S.1
Moshchuk, A.2
Wang, H.J.3
Schechter, S.4
Jackson, C.5
-
12
-
-
84862909641
-
Attacks on WebView in the android system
-
LUO, T., HAO, H., DU, W., WANG, Y., and YIN, H. Attacks on WebView in the Android system. In 27th Annual Computer Security Applications Conference (2011).
-
(2011)
27th Annual Computer Security Applications Conference
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
13
-
-
84945194920
-
Touchjacking attacks on web in android, iOS, and windows phone
-
LUO, T., JIN, X., ANANTHANARAYANAN, A., and DU, W. Touchjacking Attacks on Web in Android, iOS, and Windows Phone. In 5th International Symposium on Foundations and Practice of Security (2012).
-
(2012)
5th International Symposium on Foundations and Practice of Security
-
-
Luo, T.1
Jin, X.2
Ananthanarayanan, A.3
Du, W.4
-
14
-
-
84869048738
-
-
MICROSOFT. User Account Control. microsoft.com/en-us/library/windows/desktop/aa511445.aspx.
-
User Account Control
-
-
-
15
-
-
85076893377
-
SpyProxy: Execution-based detection of Malicious web content
-
MOSHCHUK, A., BRAGIN, T., DEVILLE, D., GRIBBLE, S. D., and LEVY, H. M. SpyProxy: Execution-Based Detection of Malicious Web Content. In 16th USENIX Security Symposium (2007).
-
(2007)
16th USENIX Security Symposium
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.D.4
Levy, H.M.5
-
16
-
-
80052803379
-
Do windows users follow the principle of Least privilege?: Investigating user account control practices
-
MOTIEE, S., HAWKEY, K., and BEZNOSOV, K. Do Windows Users Follow the Principle of Least Privilege?: Investigating User Account Control Practices. In Symposium on Usable Privacy and Security (2010).
-
(2010)
Symposium on Usable Privacy and Security
-
-
Motiee, S.1
Hawkey, K.2
Beznosov, K.3
-
17
-
-
84871959049
-
Ad-droid: Privilege separation for applications and advertisers in android
-
PEARCE, P., and FELT., A. P., NUNEZ, G., and WAGNER, D. Ad-Droid: Privilege Separation for Applications and Advertisers in Android. In ACM Symposium on Information, Computer and Communications Security (AsiaCCS) (2012).
-
(2012)
ACM Symposium on Information, Computer and Communications Security (AsiaCCS)
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
19
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
ROESNER, F., KOHNO, T., MOSHCHUK, A., PARNO, B., and WANG., H. J., and COWAN, C. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In IEEE Symposium on Security and Privacy (2012).
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
20
-
-
80755172908
-
Busting frame busting: A study of clickjacking vulnerabilities on popular sites
-
RYDSTEDT, G., BURSZTEIN, E., BONEH, D., and JACKSON, C. Busting Frame Busting: A Study of Clickjacking Vulnerabilities on Popular Sites. In IEEE Workshop on Web 2.0 Security and Privacy (2010).
-
(2010)
IEEE Workshop on Web 2.0 Security and Privacy
-
-
Rydstedt, G.1
Bursztein, E.2
Boneh, D.3
Jackson, C.4
-
21
-
-
74049155648
-
The emperor's new security indicators
-
SCHECHTER, S., DHAMIJA, R., OZMENT, A., and FISCHER, I. The Emperor's New Security Indicators. In IEEE Symposium on Security and Privacy (2007).
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
22
-
-
85084163031
-
Design of the EROS trusted window system
-
SHAPIRO, J. S., VANDERBURGH, J., NORTHUP, E., and CHIZ-MADIA, D. Design of the EROS Trusted Window System. In 13th USENIX Security Symposium (2004).
-
(2004)
13th USENIX Security Symposium
-
-
Shapiro, J.S.1
Vanderburgh, J.2
Northup, E.3
Chiz-Madia, D.4
-
24
-
-
84874888751
-
-
SOPHOS LABS. Facebook Worm: Likejacking, 2010. http://nakedsecurity.sophos.com/2010/05/31/facebook-likejacking-worm/.
-
(2010)
Facebook Worm: Likejacking
-
-
-
26
-
-
85076317222
-
Placeraider: Virtual theft in physical spaces with smartphones
-
TEMPLEMAN, R., RAHMAN, Z., CRANDALL, D. J., and KA-PADIA, A. Placeraider: Virtual theft in physical spaces with smartphones. CoRR abs/1209.5982 (2012).
-
(2012)
CoRR
-
-
Templeman, R.1
Rahman, Z.2
Crandall, D.J.3
Ka-Padia, A.4
-
27
-
-
41149151731
-
-
W3C. Same Origin Policy. http://www.w3.org/Security/wiki/Same_Origin_Policy.
-
Same Origin Policy
-
-
-
29
-
-
77954608267
-
The multi-principal OS construction of the gazelle web browser
-
WANG, H. J., GRIER, C., MOSHCHUK, A., KING, S. T., CHOUDHURY, P., and VENTER, H. The Multi-Principal OS Construction of the Gazelle Web Browser. In 18th USENIX Security Symposium (2009).
-
(2009)
18th USENIX Security Symposium
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
30
-
-
33751037227
-
-
Tech. Rep. MTR 9992, Revision 1 (also published by the Defense Intelligence Agency as DDS-2600-5502-87), The MITRE Corporation, Nov.
-
WOODWARD, J. P. L. Security Requirements for System High and Compartmented Mode Workstations. Tech. Rep. MTR 9992, Revision 1 (also published by the Defense Intelligence Agency as DDS-2600-5502-87), The MITRE Corporation, Nov. 1987.
-
(1987)
Security Requirements for System High and Compartmented Mode Workstations
-
-
Woodward, J.P.L.1
-
31
-
-
12844271558
-
Aligning security and usability
-
Sept.
-
YEE, K.-P. Aligning Security and Usability. IEEE Security and Privacy 2(5) (Sept. 2004), 48-55.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.-P.1
|