메뉴 건너뛰기




Volumn , Issue , 2014, Pages

A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID (OPERATING SYSTEM); ARTIFICIAL INTELLIGENCE; CLASSIFICATION (OF INFORMATION); LEARNING SYSTEMS; MOBILE SECURITY; NETWORK SECURITY;

EID: 85179847964     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23039     Document Type: Conference Paper
Times cited : (299)

References (47)
  • 3
    • 84873675066 scopus 로고    scopus 로고
    • Leakminer: Detect information leakage on android with static taint analysis
    • Z. Yang and M. Yang, “Leakminer: Detect information leakage on android with static taint analysis,” in Third World Congress on Software Engineering (WCSE 2012), 2012, pp. 101–104.
    • (2012) Third World Congress on Software Engineering (WCSE 2012) , pp. 101-104
    • Yang, Z.1    Yang, M.2
  • 6
    • 84904751486 scopus 로고    scopus 로고
    • ScanDal: Static analyzer for detecting privacy leaks in android applications
    • H. Chen, L. Koved, and D. S. Wallach, Eds. Los Alamitos, CA, USA: IEEE, May [Online]. Available
    • J. Kim, Y. Yoon, K. Yi, and J. Shin, “ScanDal: Static analyzer for detecting privacy leaks in android applications,” in MoST 2012: Mobile Security Technologies 2012, H. Chen, L. Koved, and D. S. Wallach, Eds. Los Alamitos, CA, USA: IEEE, May 2012. [Online]. Available: http://ropas.snu.ac.kr/scandal/
    • (2012) MoST 2012: Mobile Security Technologies 2012
    • Kim, J.1    Yoon, Y.2    Yi, K.3    Shin, J.4
  • 7
    • 84863084209 scopus 로고    scopus 로고
    • Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale
    • Berlin, Heidelberg: Springer-Verlag, [Online]. Available
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen, “Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale,” in Proceedings of the 5th international conference on Trust and Trustworthy Computing, ser. TRUST’12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 291–307. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-30921-2_17
    • (2012) Proceedings of the 5th international conference on Trust and Trustworthy Computing, ser. TRUST’12 , pp. 291-307
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 9
    • 84863587187 scopus 로고    scopus 로고
    • A framework for static detection of privacy leaks in android applications
    • New York, NY, USA: ACM, [Online]. Available
    • C. Mann and A. Starostin, “A framework for static detection of privacy leaks in android applications,” in Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC’12. New York, NY, USA: ACM, 2012, pp. 1457–1462. [Online]. Available: http://doi.acm.org/10.1145/2231936.2232009
    • (2012) Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC’12 , pp. 1457-1462
    • Mann, C.1    Starostin, A.2
  • 10
    • 84874579631 scopus 로고    scopus 로고
    • ”trustdroid;”: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking
    • Z. Zhao and F. C. C. Osorio, “”trustdroid;”: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking,” in MALWARE, 2012, pp. 135–143.
    • (2012) MALWARE , pp. 135-143
    • Zhao, Z.1    Osorio, F. C. C.2
  • 12
    • 84901625779 scopus 로고    scopus 로고
    • Apr
    • “Fortify 360 source code analyzer (sca),” Apr. 2013, http://www8.hp.com/us/en/softwaresolutions/software.html?compURI=1214365#.UW6CVKuAtfQ.
    • (2013) Fortify 360 source code analyzer (sca)
  • 13
    • 84901587713 scopus 로고    scopus 로고
    • Apr
    • “Ibm rational appscan,” Apr. 2013, http://www01.ibm.com/software/de/rational/appscan/.
    • (2013) Ibm rational appscan
  • 14
    • 85076889619 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth, “Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones,” in OSDI, 2010, pp. 393–407.
    • (2010) OSDI , pp. 393-407
    • Enck, W.1    Gilbert, P.2    gon Chun, B.3    Cox, L. P.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 15
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: practical policy enforcement for android applications
    • Berkeley, CA, USA: USENIX Association, [Online]. Available
    • R. Xu, H. Saïdi, and R. Anderson, “Aurasium: practical policy enforcement for android applications,” in Proceedings of the 21st USENIX conference on Security symposium, ser. Security’12. Berkeley, CA, USA: USENIX Association, 2012, pp. 27–27. [Online]. Available: http://dl.acm.org/citation.cfm?id=2362793.2362820
    • (2012) Proceedings of the 21st USENIX conference on Security symposium, ser. Security’12 , pp. 27-27
    • Xu, R.1    Saïdi, H.2    Anderson, R.3
  • 18
    • 85180632116 scopus 로고    scopus 로고
    • aug
    • “Google mirror api,” aug 2013, https://code.google.com/p/google-api-java-client/wiki/APIs#Google_Mirror_API.
    • (2013) Google mirror api
  • 19
    • 84877978007 scopus 로고    scopus 로고
    • aug
    • “Google glass,” aug 2013, https://developers.google.com/glass/.
    • (2013) Google glass
  • 20
    • 85180626447 scopus 로고    scopus 로고
    • aug
    • “Google cast,” aug 2013, https://developers.google.com/cast.
    • (2013) Google cast
  • 21
    • 84901602864 scopus 로고    scopus 로고
    • aug
    • “Virus share,” aug 2013, http://virusshare.com/.
    • (2013) Virus share
  • 25
    • 0003120218 scopus 로고    scopus 로고
    • B. Schölkopf, C. J. C. Burges, and A. J. Smola, Eds. Cambridge, MA, USA: MIT Press, ch. Fast training of support vector machines using sequential minimal optimization, [Online]. Available
    • J. C. Platt, “Advances in kernel methods,” B. Schölkopf, C. J. C. Burges, and A. J. Smola, Eds. Cambridge, MA, USA: MIT Press, 1999, ch. Fast training of support vector machines using sequential minimal optimization, pp. 185–208. [Online]. Available: http://dl.acm.org/citation.cfm?id=299094.299105
    • (1999) Advances in kernel methods , pp. 185-208
    • Platt, J. C.1
  • 28
    • 10044283198 scopus 로고    scopus 로고
    • The Optimality of Naive Bayes
    • Barr and Z. Markov, Eds. AAAI Press, [Online]. Available
    • H. Zhang, “The Optimality of Naive Bayes.” in FLAIRS Conference, V. Barr and Z. Markov, Eds. AAAI Press, 2004. [Online]. Available: http://www.cs.unb.ca/profs/hzhang/publications/FLAIRS04ZhangH.pdf
    • (2004) FLAIRS Conference
    • Zhang, H.1
  • 30
    • 85164392958 scopus 로고
    • A study of cross-validation and bootstrap for accuracy estimation and model selection
    • R. Kohavi, “A study of cross-validation and bootstrap for accuracy estimation and model selection.” Morgan Kaufmann, 1995, pp. 1137–1143.
    • (1995) Morgan Kaufmann , pp. 1137-1143
    • Kohavi, R.1
  • 31
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Washington, DC, USA: IEEE Computer Society, [Online]. Available
    • Y. Zhou and X. Jiang, “Dissecting android malware: Characterization and evolution,” in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 95–109. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.16
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12 , pp. 95-109
    • Zhou, Y.1    Jiang, X.2
  • 33
    • 85180629780 scopus 로고    scopus 로고
    • aug
    • “The google maps geolocation api,” aug 2013, https://developers.google.com/maps/documentation/business/geolocation/.
    • (2013) The google maps geolocation api
  • 34
    • 85180634239 scopus 로고    scopus 로고
    • aug
    • “Android api differences report,” aug 2013, https://developer.android.com/sdk/api_diff/9/changes.html.
    • (2013) Android api differences report
  • 35
    • 85180634239 scopus 로고    scopus 로고
    • aug
    • “Android api differences report,” aug 2013, https://developer.android.com/sdk/api_diff/17/changes.html.
    • (2013) Android api differences report
  • 36
    • 85180634239 scopus 로고    scopus 로고
    • aug
    • “Android api differences report,” aug 2013, https://developer.android.com/sdk/api_diff/18/changes.html.
    • (2013) Android api differences report
  • 38
    • 85180631864 scopus 로고    scopus 로고
    • apr
    • “Scandroid,” apr 2013, https://github.com/SCanDroid.
    • (2013) Scandroid
  • 40
    • 85180622825 scopus 로고    scopus 로고
    • Apr
    • “cyanogenmod,” Apr. 2013, http://www.cyanogenmod.org/.
    • (2013) cyanogenmod
  • 41
    • 85180635755 scopus 로고    scopus 로고
    • Flowdroid: Precise context-, flow-, object-sensitive and lifecycle-aware taint analysis for android apps
    • C. Fritz, S. Arzt, S. Rasthofer, and E. Bodden, “Flowdroid: Precise context-, flow-, object-sensitive and lifecycle-aware taint analysis for android apps,” in Submitted to ACM CCS 2013.
    • (2013) Submitted to ACM CCS
    • Fritz, C.1    Arzt, S.2    Rasthofer, S.3    Bodden, E.4
  • 42
    • 67650837962 scopus 로고    scopus 로고
    • Merlin: Specification inference for explicit information flow problems
    • Jun. [Online]. Available
    • B. Livshits, A. V. Nori, S. K. Rajamani, and A. Banerjee, “Merlin: Specification inference for explicit information flow problems,” SIGPLAN Not., vol. 44, no. 6, pp. 75–86, Jun. 2009. [Online]. Available: http://doi.acm.org/10.1145/1543135.1542485
    • (2009) SIGPLAN Not , vol.44 , Issue.6 , pp. 75-86
    • Livshits, B.1    Nori, A. V.2    Rajamani, S. K.3    Banerjee, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.