-
2
-
-
84995298446
-
-
Online; accessed at May 17
-
Tridgell Andrew. Spamsum README. http://samba. org/ftp/unpacked/junkcode/spamsum/README. Online; accessed at May 17, 2011.
-
(2011)
Spamsum README
-
-
Andrew, T.1
-
3
-
-
84872517124
-
-
Online; accessed at June 1
-
AndroLib. Android Market Statistics from AndroLib. http://www. androlib. com/appstats. aspx. Online; accessed at June 1, 2011.
-
(2011)
Android Market Statistics from AndroLib
-
-
-
4
-
-
81855212018
-
-
Technical report, School of Computer Science, Carleton University. Online; accessed at May 17
-
David Barrera, William Enck, and Paul Oorschot. Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report, School of Computer Science, Carleton University, http://www. scs. carleton. ca/shared/research/tech_reports/2010/TR-11-06%20Barrera. pdf. Online; accessed at May 17, 2011.
-
(2011)
Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems
-
-
Barrera, D.1
Enck, W.2
Oorschot, P.3
-
5
-
-
78649990344
-
A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android
-
David Barrera, H. Güneş Kayacik, Paul C. van Oorschot, and Anil Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
-
-
Barrera, D.1
Güneş Kayacik, H.2
Oorschot Van, P.C.3
Somayaji, A.4
-
6
-
-
84860764042
-
MockDroid: Trading Privacy for Application Functionality on Smartphones
-
Alastair Beresford, Andrew Rice, Nicholas Skehin, and Ripduman Sohan. MockDroid: Trading Privacy for Application Functionality on Smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, 2011.
-
(2011)
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11
-
-
Beresford, A.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
8
-
-
79961035117
-
Analyzing Inter-Application Communication in Android
-
Erika Chin, Adrienne Felt, Kate Greenwood, and David Wagner. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, 2011.
-
(2011)
Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2011
-
-
Chin, E.1
Felt, A.2
Greenwood, K.3
Wagner, D.4
-
9
-
-
58049219641
-
Mining Specifications of Malicious Behavior
-
Mihai Christodorescu, Somesh Jha, and Christopher Kruegel. Mining Specifications of Malicious Behavior. In Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC-FSE '07, pages 5-14. ACM, 2007.
-
(2007)
Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC-FSE '07
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
10
-
-
85139871888
-
-
Online; accessed at May 17
-
Cydia. Cydia App Store. http://cydia. saurik. com/. Online; accessed at May 17, 2011.
-
(2011)
Cydia App Store
-
-
-
11
-
-
85066347237
-
QUIRE: Lightweight Provenance for Smart Phone Operating Systems
-
San Francisco, CA
-
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan Wallach. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D.5
-
12
-
-
84888331381
-
PiOS: Detecting Privacy Leaks in iOS Applications
-
February
-
Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11, February 2011.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
13
-
-
79955570859
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
William Enck, Peter Gilbert, Byung-gon Chun, Landon Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11, 2011.
-
(2011)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
14
-
-
85025700509
-
A Study of Android Application Security
-
San Francisco, CA
-
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
15
-
-
74049155830
-
On Lightweight Mobile Phone Application Certification
-
New York, NY, USA. ACM
-
William Enck, Machigar Ongtang, and Patrick McDaniel. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 235-245, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
16
-
-
80755187788
-
Android Permissions Demystified
-
Adrienne Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS' 11, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS' 11
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
17
-
-
85046879731
-
Permission Re-Delegation: Attacks and Defense
-
San Francisco, CA
-
Adrienne Felt, Helen Wang, Alexander Moschhuk, Steve Hanna, and Erika Chin. Permission Re-Delegation: Attacks and Defense. In Proceedings of the 20th USENIX Security Symposium, USENIX Security '11, San Francisco, CA, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium, USENIX Security '11
-
-
Felt, A.1
Wang, H.2
Moschhuk, A.3
Hanna, S.4
Chin, E.5
-
19
-
-
85165758676
-
Systematic Detection of Capability Leaks in Stock Android Smartphones
-
February
-
Michael Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
21
-
-
79960716410
-
-
Technical report, Access Data Inc. Online; accessed at May 17
-
Dustin Hurlbut. Fuzzy Hashing for Digital Forensic Investigators. Technical report, Access Data Inc., http://accessdata. com/downloads/media/Fuzzy_Hashing_for_Investigators. pdf. Online; accessed at May 17, 2011.
-
(2011)
Fuzzy Hashing for Digital Forensic Investigators
-
-
Hurlbut, D.1
-
22
-
-
85139837164
-
-
Amazon. com Inc. Online; accessed at May 17
-
Amazon. com Inc. Amazon AppStore for Android. http://www. amazon. com/mobile-apps/b?ie=UTF8&node=2350149011. Online; accessed at May 17, 2011.
-
(2011)
Amazon AppStore for Android
-
-
-
23
-
-
85139863515
-
-
Apple Inc. Online; accessed at May 17
-
Apple Inc. Apple App Store for IPhone. http://www. apple. com/iphone/apps-for-iphone/. Online; accessed at May 17, 2011.
-
(2011)
Apple App Store for IPhone
-
-
-
24
-
-
85139838764
-
-
Google Inc. Online; accessed at May 17
-
Google Inc. Admob for Android Developers. http://developer. admob. com/wiki/Android. Online; accessed at May 17, 2011.
-
(2011)
Admob for Android Developers
-
-
-
25
-
-
85139838702
-
-
Google Inc. Online; accessed at May 17
-
Google Inc. Android Dvelopment Guide: Signing Your Applications. http://developer. android. com/guide/publishing/app-signing. html. Online; accessed at May 17, 2011.
-
(2011)
Android Dvelopment Guide: Signing Your Applications
-
-
-
26
-
-
84255172137
-
-
Google Inc. Online; accessed at May 17
-
Google Inc. Android Market. https://market. android. com/. Online; accessed at May 17, 2011.
-
(2011)
Android Market
-
-
-
27
-
-
84884148402
-
-
Lookout Inc. Online; accessed at May 17, 2011
-
Lookout Inc. App Genome Report: February 2011. https://www. mylookout. com/appgenome/. Online; accessed at May 17, 2011.
-
(2011)
App Genome Report: February
-
-
-
30
-
-
84873741695
-
-
Symantec Inc. Online; accessed at May 17
-
Symantec Inc. Android Threats Getting Steamy. http://www. symantec. com/connect/blogs/android-threats-getting-steamy. Online; accessed at May 17, 2011.
-
(2011)
Android Threats Getting Steamy
-
-
-
31
-
-
85139823054
-
-
Wooboo Inc. Online; accessed at May 17
-
Wooboo Inc. How to add Wooboo advertisement SDK into Android. http://admin. wooboo. com. cn: 9001/cbFiles/down/1272545843644. swf. Online; accessed at May 17, 2011.
-
(2011)
How to add Wooboo advertisement SDK into Android
-
-
-
33
-
-
52249094557
-
Identifying Almost Identical Files Using Context Triggered Piecewise Hashing
-
Jesse Kornblum. Identifying Almost Identical Files Using Context Triggered Piecewise Hashing. DFRWS '06, 2006.
-
(2006)
DFRWS '06
-
-
Kornblum, J.1
-
35
-
-
85139852465
-
-
Kaspersky Lab. Online; Accessed at May 17
-
Kaspersky Lab. First SMS Trojan Detected for Smartphones Running Android. http://www. kaspersky. com/about/news/virus/2010/First_SMS_Trojan_ detected_for_smartphones_running_Android. Online; Accessed at May 17, 2011.
-
(2011)
First SMS Trojan Detected for Smartphones Running Android
-
-
-
36
-
-
33644528723
-
K-gram Based Software Birthmarks
-
New York, NY, USA. ACM
-
Ginger Myles and Christian Collberg. K-gram Based Software Birthmarks. In Proceedings of the 2005 ACM Symposium on Applied Computing, SAC '05, pages 314-318, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 2005 ACM Symposium on Applied Computing, SAC '05
, pp. 314-318
-
-
Myles, G.1
Collberg, C.2
-
37
-
-
77954487766
-
Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints
-
Mohammad Nauman, Sohail Khan, and Xinwen Zhang. Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
38
-
-
77950851532
-
Semantically Rich Application-Centric Security in Android
-
Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel. Semantically Rich Application-Centric Security in Android. In Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09, 2009.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
39
-
-
1142267351
-
Winnowing: Local Algorithms for Document Fingerprinting
-
New York, NY, USA. ACM
-
Saul Schleimer, Daniel S. Wilkerson, and Alex Aiken. Winnowing: Local Algorithms for Document Fingerprinting. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD '03, pages 76-85, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD '03
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
40
-
-
85139859278
-
Angry Birds, Flocking to Cellphones Everywhere
-
Online; accessed at May 17
-
New York Times. Angry Birds, Flocking to Cellphones Everywhere. http://www. nytimes. com/2010/12/12/technology/12birds. htm. Online; accessed at May 17, 2011.
-
(2011)
New York Times
-
-
-
41
-
-
85027555608
-
SigFree: A Signature-Free Buffer Overflow Attack Blocker
-
Berkeley, CA, USA. USENIX Association
-
Xinran Wang, Chi-Chun Pan, Peng Liu, and Sencun Zhu. SigFree: A Signature-Free Buffer Overflow Attack Blocker. In Proceedings of the 15th Conference on USENIX Security Symposium-Volume 15, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
-
-
Wang, X.1
Pan, C.2
Liu, P.3
Zhu, S.4
-
42
-
-
85139878902
-
-
Youmi. net. Online; accessed at May 17
-
Youmi. net. Wiki-Youmi Android Banner Version 2. 1. http://wiki. youmi. net/wiki/Youmi_ Android_Banner_Version_2. 1. Online; accessed at May 17, 2011.
-
(2011)
Wiki-Youmi Android Banner Version 2. 1
-
-
-
43
-
-
85172622386
-
Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
February
-
Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012.
-
(2012)
Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
44
-
-
85037359376
-
Taming Information-Stealing Smartphone Applications (on Android)
-
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, and Vince Freeh. Taming Information-Stealing Smartphone Applications (on Android). In Proceeding of the 4th International Conference on Trust and Trustworthy Computing, TRUST '11, 2011.
-
(2011)
Proceeding of the 4th International Conference on Trust and Trustworthy Computing, TRUST '11
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
|