-
1
-
-
84876097115
-
-
Android debug bridge. http://developer.android.com/guide/developing/tools/ adb.html.
-
Android Debug Bridge
-
-
-
2
-
-
85080480677
-
-
Android developers. http://developer.android.com/.
-
-
-
-
3
-
-
85080539457
-
-
Android developers sdk. http://developer.android.com/sdk/android-1.1.html.
-
-
-
-
5
-
-
85080626124
-
-
Applications using webkit - webkit. http://trac.webkit.org/wiki/Applications\ %20using\%20WebKit.
-
-
-
-
6
-
-
85080507678
-
-
Easy root. http://www.unstableapps.com/buyme.html.
-
-
-
-
9
-
-
85080563881
-
-
Open handset alliance. http://www.openhandsetalliance.com/.
-
-
-
-
11
-
-
85080489116
-
-
Root tools. https://market.android.com/details?id=com.jrummy.roottools.
-
-
-
-
14
-
-
85080528610
-
-
What is android. http://developer.android.com/guide/basics/what-is-android.html.
-
-
-
-
17
-
-
85080474987
-
-
May
-
Worm:symbos/yxe. http://www.f-secure.com/v-descs/worm_symbos_yxe.shtml, May 2007.
-
(2007)
-
-
-
19
-
-
84891349117
-
-
Dec
-
Rooting the droid without rsdlite. http://androidforums.com/droid-all-things-root/171056-rooting-droid-withoutrsd-lite-up-including-frg83d.html, Dec. 2010.
-
(2010)
Rooting the Droid without Rsdlite
-
-
-
20
-
-
85080537822
-
-
Jan
-
Canvas: Owning android. http://partners.immunityinc.com/movies/Lightning\ _Demo\_Android.zip, Jan. 2011.
-
(2011)
-
-
-
21
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
ACM
-
D. Barrera, H. Kayacik, P. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security, pages 73–84. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.2
van Oorschot, P.3
Somayaji, A.4
-
22
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
2008, May
-
D. Brumley, P. Poosankam, D. Song, and J. Zheng. Automatic patch-based exploit generation is possible: Techniques and implications. In IEEE Symp. S.& P. 2008, pages 143–157, May 2008.
-
(2008)
IEEE Symp. S.& P.
, pp. 143-157
-
-
Brumley, D.1
Poosankam, P.2
Song, D.3
Zheng, J.4
-
24
-
-
84862153906
-
-
25 C. Davies. Sprint htc hero android 2.1 update released. http://www.slashgear.com/ sprint-htc-hero-android-2-1-updatereleased-1986138/, May
-
T. Cannon. Android lock screen bypass. http://thomascannon.net/blog/2011/02/android-lock-screen-bypass. [25] C. Davies. Sprint htc hero android 2.1 update released. http://www.slashgear.com/ sprint-htc-hero-android-2-1-updatereleased-1986138/, May 2010.
-
(2010)
Android Lock Screen Bypass
-
-
Cannon, T.1
-
25
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of OSDI, 2010.
-
(2010)
Proceedings of OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
27
-
-
14844282642
-
-
Computer and Communications Industry Association
-
D. Geer, R. Bace, P. Gutmann, P. Metzger, C. Pfleeger, J. Quarterman, and B. Schneier. Cyberinsecurity: The cost of monopoly. Computer and Communications Industry Association, 2003.
-
(2003)
Cyberinsecurity: The Cost of Monopoly
-
-
Geer, D.1
Bace, R.2
Gutmann, P.3
Metzger, P.4
Pfleeger, C.5
Quarterman, J.6
Schneier, B.7
-
31
-
-
85080541883
-
-
Mar
-
K. Mahaffey. http://blog.mylookout.com/2011/03/security-alert-malware-found-in-official-android-market-droiddream/, Mar. 2011.
-
(2011)
-
-
Mahaffey, K.1
-
35
-
-
85080525397
-
Android 2.2 upgrade list: Is your phone getting froyo?
-
June
-
J. Raphael. Android 2.2 upgrade list: Is your phone getting Froyo? - Computerworld Blogs. http://blogs.computerworld.com/16310/android\_22\_upgrade\_list, June 2010.
-
(2010)
Computerworld Blogs
-
-
Raphael, J.1
-
36
-
-
77950673302
-
Securing android-powered mobile devices using SELinux
-
A. Shabtai, Y. Fledel, and Y. Elovici. Securing Android-powered mobile devices using SELinux. Security & Privacy, IEEE, 8(3):36–44, 2010.
-
(2010)
Security & Privacy, IEEE
, vol.8
, Issue.3
, pp. 36-44
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
37
-
-
77950675112
-
Google android: A comprehensive security assessment
-
march-april
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. Google android: A comprehensive security assessment. Security Privacy, IEEE, 8(2):35 –44, march-april 2010.
-
(2010)
Security Privacy, IEEE
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
40
-
-
84864618030
-
Towards a general collection methodology for android devices
-
Aug
-
T. Vidas, C. Zhang, and N. Christin. Towards a general collection methodology for android devices. DFRWS 2011, Aug. 2011.
-
(2011)
DFRWS 2011
-
-
Vidas, T.1
Zhang, C.2
Christin, N.3
|