-
1
-
-
85180401000
-
-
Android 4.2 APIs. http://developer.android.com/about/versions/android-4.2.html.
-
Android 4.2 APIs
-
-
-
2
-
-
85076676563
-
-
App Store (iOS). http://en.wikipedia.org/wiki/App_Store_(iOS).
-
App Store (iOS)
-
-
-
4
-
-
84870428915
-
-
Google Play. http://en.wikipedia.org/wiki/Google_Play.
-
Google Play
-
-
-
5
-
-
84874410958
-
-
Java PathFinder. http://babelfish.arc.nasa.gov/trac/jpf.
-
Java PathFinder
-
-
-
7
-
-
85180418801
-
-
Sina Weibo. http://en.wikipedia.org/wiki/Sina_Weibo.
-
Sina Weibo
-
-
-
8
-
-
85180405546
-
-
The Risk You Carry in Your Pocket. https://media.blackhat.com/bh-ad-10/Nils/Black-HatAD-2010-android-sandcastle-slides.pdf.
-
The Risk You Carry in Your Pocket
-
-
-
9
-
-
79961083020
-
-
Your Apps Are Watching You. http://online.wsj.com/article/SB10001424052748704694004576020083703574602. html.
-
Your Apps Are Watching You
-
-
-
11
-
-
82655162792
-
Cells: A Virtual Mobile Smartphone Architecture
-
J. Andrus, C. Dall, A. Van't Hof, O. Laadan, and J. Nieh. Cells: A Virtual Mobile Smartphone Architecture. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP, 2011.
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP
-
-
Andrus, J.1
Dall, C.2
Van't Hof, A.3
Laadan, O.4
Nieh, J.5
-
12
-
-
85164205772
-
AEG: Automatic Exploit Generation
-
T. Avgerinos, S. K. Cha, B. L. T. Hao, and D. Brumley. AEG: Automatic Exploit Generation. In Proceedings of the 18th Annual Symposium on Network and Distributed System Security, NDSS, 2011.
-
(2011)
Proceedings of the 18th Annual Symposium on Network and Distributed System Security, NDSS
-
-
Avgerinos, T.1
Cha, S. K.2
Hao, B. L. T.3
Brumley, D.4
-
13
-
-
84860764042
-
MockDroid: Trading Privacy for Application Functionality on Smartphones
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. MockDroid: Trading Privacy for Application Functionality on Smartphones. In Proceedings of the 12th International Workshop on Mobile Computing System and Applications, HotMobile, 2011.
-
(2011)
Proceedings of the 12th International Workshop on Mobile Computing System and Applications, HotMobile
-
-
Beresford, A. R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
14
-
-
59249098846
-
Sting: an end-to-end self-healing system for defending against internet worms
-
Editors Christodorescu, Jha, Maughn, Song
-
D. Brumley, J. Newsome, and D. Song. Sting: an end-to-end self-healing system for defending against internet worms. In Book chapter in”Malware Detection and Defense”, Editors Christodorescu, Jha, Maughn, Song, 2007.
-
(2007)
Book chapter in”Malware Detection and Defense
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
-
15
-
-
84888341014
-
Towards Taming Privilege-Escalation Attacks on Android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards Taming Privilege-Escalation Attacks on Android. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS, 2012.
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
17
-
-
79961035117
-
Analyzing Inter-Application Communication in Android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys, 2011.
-
(2011)
Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys
-
-
Chin, E.1
Felt, A. P.2
Greenwood, K.3
Wagner, D.4
-
18
-
-
85180792449
-
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger, and A.-R. Sadeghi. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS, 2012.
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nurnberger, S.7
Sadeghi, A.-R.8
-
19
-
-
84856198950
-
Privilege escalation attacks on android
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy. Privilege escalation attacks on android. In Proceedings of the 13th international conference on Information security, ISC, 2010.
-
(2010)
Proceedings of the 13th international conference on Information security, ISC
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
20
-
-
85066347237
-
QUIRE: Lightweight Provenance for Smart Phone Operating Systems
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, USENIX Security, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D. S.5
-
21
-
-
84888331381
-
PiOS: Detecting Privacy Leaks in iOS Applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Symposium on Network and Distributed System Security, NDSS, 2011.
-
(2011)
Proceedings of the 18th Annual Symposium on Network and Distributed System Security, NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
22
-
-
85076889619
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
USENIX OSDI
-
W. Enck, P. Gilbert, B.-g. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI, 2010.
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-g.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
23
-
-
85025700509
-
A Study of Android Application Security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium, USENIX Security, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
24
-
-
80755187788
-
Android Permissions Demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS
-
-
Felt, A. P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
25
-
-
85046879731
-
Permission Re-Delegation: Attacks and Defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium, USENIX Security, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security
-
-
Felt, A. P.1
Wang, H. J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
26
-
-
84860660623
-
Unsafe Exposure Analysis of Mobile In-App Advertisements
-
M. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe Exposure Analysis of Mobile In-App Advertisements. In Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, 2012.
-
(2012)
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec
-
-
Grace, M.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
27
-
-
85165758676
-
Systematic Detection of Capability Leaks in Stock Android Smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS, 2012.
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
28
-
-
84864334986
-
RiskRanker: Scalable and Accurate Zero-day Android Malware Detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the 10th International Conference on Mobile Systems, Applications and Services, MobiSys, 2012.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications and Services, MobiSys
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
29
-
-
34547446292
-
The Confused Deputy: (or why capabilities might have been invented)
-
October
-
N. Hardy. The Confused Deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review, 22, October 1998.
-
(1998)
ACM SIGOPS Operating Systems Review
, vol.22
-
-
Hardy, N.1
-
30
-
-
80755187778
-
These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
31
-
-
84869790502
-
Dr. android and mr. hide: Fine-grained permissions in android applications
-
CCS-SPSM
-
J. Jeon, K. K. Micinski, J. A. Vaughan, A. Fogel, N. Reddy, J. S. Foster, and T. Millstein. Dr. android and mr. hide: Fine-grained permissions in android applications. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM, 2012.
-
(2012)
ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Jeon, J.1
Micinski, K. K.2
Vaughan, J. A.3
Fogel, A.4
Reddy, N.5
Foster, J. S.6
Millstein, T.7
-
32
-
-
80755143400
-
L4Android: A Generic Operating System Framework for Secure Smartphones
-
CCS-SPSM
-
M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter. L4Android: A Generic Operating System Framework for Secure Smartphones. In Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM, 2011.
-
(2011)
Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
33
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: Statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS, 2012.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
34
-
-
77954487766
-
Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
35
-
-
84871959049
-
AdDroid: Privilege Separation for Applications and Advertisers in Android
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner. AdDroid: Privilege Separation for Applications and Advertisers in Android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS, 2012.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS
-
-
Pearce, P.1
Felt, A. P.2
Nunez, G.3
Wagner, D.4
-
36
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS, 2012.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
37
-
-
85008263148
-
Loop-extended symbolic execution on binary programs
-
P. Saxena, P. Poosankam, S. McCamant, and D. Song. Loop-extended symbolic execution on binary programs. In Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA, 2009.
-
(2009)
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA
-
-
Saxena, P.1
Poosankam, P.2
McCamant, S.3
Song, D.4
-
39
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis. In Proceedings of the 4th International Conference on Information Systems Security, ICISS, 2008.
-
(2008)
Proceedings of the 4th International Conference on Information Systems Security, ICISS
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M. G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
42
-
-
84874828789
-
Fast, scalable detection of 'piggybacked' mobile applications
-
W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou. Fast, scalable detection of 'piggybacked' mobile applications. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, CODASPY, 2013.
-
(2013)
Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, CODASPY
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
43
-
-
85137132511
-
DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY, 2012.
-
(2012)
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
45
-
-
85172622386
-
Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS, 2012.
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
46
-
-
85037359376
-
Taming Information-Stealing Smartphone Applications (on Android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming Information-Stealing Smartphone Applications (on Android). In Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST, 2011.
-
(2011)
Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V. W.4
|