-
1
-
-
84877942991
-
Slicing Droids: Program Slicing for Smali Code
-
ACM, Ed., –0
-
J. Hoffmann, M. Ussath, M. Spreitzenbarth, and T. Holz, “Slicing Droids: Program Slicing for Smali Code,” in Proceedings of the 28th Symposium On Applied Computing, ACM, Ed., 2013, pp. 0–0.
-
(2013)
Proceedings of the 28th Symposium On Applied Computing
, pp. 0
-
-
Hoffmann, J.1
Ussath, M.2
Spreitzenbarth, M.3
Holz, T.4
-
2
-
-
84869416020
-
Chex: statically vetting android apps for component hijacking vulnerabilities
-
New York, NY, USA: ACM, [Online]. Available
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, “Chex: statically vetting android apps for component hijacking vulnerabilities,” in Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS’12. New York, NY, USA: ACM, 2012, pp. 229–240. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382223
-
(2012)
Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS’12
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
4
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA: USENIX Association, [Online]. Available
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security,” in Proceedings of the 20th USENIX conference on Security, ser. SEC’11. Berkeley, CA, USA: USENIX Association, 2011, pp. 21–21. [Online]. Available: http://dl.acm.org/citation.cfm?id=2028067.2028088
-
(2011)
Proceedings of the 20th USENIX conference on Security, ser. SEC’11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
5
-
-
79955904273
-
-
Manuscript, Univ. of Maryland
-
A. P. Fuchs, A. Chaudhuri, and J. S. Foster, “Scandroid: Automated security certification of android applications,” Manuscript, Univ. of Maryland, http://www. cs. umd. edu/~ avik/projects/scandroidascaa, 2009.
-
(2009)
Scandroid: Automated security certification of android applications
-
-
Fuchs, A. P.1
Chaudhuri, A.2
Foster, J. S.3
-
6
-
-
84904751486
-
ScanDal: Static analyzer for detecting privacy leaks in android applications
-
H. Chen, L. Koved, and D. S. Wallach, Eds. Los Alamitos, CA, USA: IEEE, May [Online]. Available
-
J. Kim, Y. Yoon, K. Yi, and J. Shin, “ScanDal: Static analyzer for detecting privacy leaks in android applications,” in MoST 2012: Mobile Security Technologies 2012, H. Chen, L. Koved, and D. S. Wallach, Eds. Los Alamitos, CA, USA: IEEE, May 2012. [Online]. Available: http://ropas.snu.ac.kr/scandal/
-
(2012)
MoST 2012: Mobile Security Technologies 2012
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
-
7
-
-
84863084209
-
Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale
-
Berlin, Heidelberg: Springer-Verlag, [Online]. Available
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen, “Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale,” in Proceedings of the 5th international conference on Trust and Trustworthy Computing, ser. TRUST’12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 291–307. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-30921-2_17
-
(2012)
Proceedings of the 5th international conference on Trust and Trustworthy Computing, ser. TRUST’12
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
8
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications
-
Washington, DC, USA: IEEE Computer Society, [Online]. Available
-
L. Batyuk, M. Herpich, S. A. Camtepe, K. Raddatz, A.-D. Schmidt, and S. Albayrak, “Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications,” in Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software, ser. MALWARE ’11. Washington, DC, USA: IEEE Computer Society, 2011, pp. 66–72. [Online]. Available: http://dx.doi.org/10.1109/MALWARE.2011.6112328
-
(2011)
Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software, ser. MALWARE ’11
, pp. 66-72
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S. A.3
Raddatz, K.4
Schmidt, A.-D.5
Albayrak, S.6
-
9
-
-
84863587187
-
A framework for static detection of privacy leaks in android applications
-
New York, NY, USA: ACM, [Online]. Available
-
C. Mann and A. Starostin, “A framework for static detection of privacy leaks in android applications,” in Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC’12. New York, NY, USA: ACM, 2012, pp. 1457–1462. [Online]. Available: http://doi.acm.org/10.1145/2231936.2232009
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC’12
, pp. 1457-1462
-
-
Mann, C.1
Starostin, A.2
-
10
-
-
84874579631
-
”trustdroid;”: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking
-
Z. Zhao and F. C. C. Osorio, “”trustdroid;”: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking,” in MALWARE, 2012, pp. 135–143.
-
(2012)
MALWARE
, pp. 135-143
-
-
Zhao, Z.1
Osorio, F. C. C.2
-
11
-
-
79961035117
-
Analyzing inter-application communication in android
-
New York, NY, USA: ACM, [Online]. Available
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, “Analyzing inter-application communication in android,” in Proceedings of the 9th international conference on Mobile systems, applications, and services, ser. MobiSys’11. New York, NY, USA: ACM, 2011, pp. 239–252. [Online]. Available: http://doi.acm.org/10.1145/1999995.2000018
-
(2011)
Proceedings of the 9th international conference on Mobile systems, applications, and services, ser. MobiSys’11
, pp. 239-252
-
-
Chin, E.1
Felt, A. P.2
Greenwood, K.3
Wagner, D.4
-
12
-
-
84901625779
-
-
Apr
-
“Fortify 360 source code analyzer (sca),” Apr. 2013, http://www8.hp.com/us/en/softwaresolutions/software.html?compURI=1214365#.UW6CVKuAtfQ.
-
(2013)
Fortify 360 source code analyzer (sca)
-
-
-
13
-
-
84901587713
-
-
Apr
-
“Ibm rational appscan,” Apr. 2013, http://www01.ibm.com/software/de/rational/appscan/.
-
(2013)
Ibm rational appscan
-
-
-
14
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth, “Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones,” in OSDI, 2010, pp. 393–407.
-
(2010)
OSDI
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
gon Chun, B.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
15
-
-
85047887956
-
Aurasium: practical policy enforcement for android applications
-
Berkeley, CA, USA: USENIX Association, [Online]. Available
-
R. Xu, H. Saïdi, and R. Anderson, “Aurasium: practical policy enforcement for android applications,” in Proceedings of the 21st USENIX conference on Security symposium, ser. Security’12. Berkeley, CA, USA: USENIX Association, 2012, pp. 27–27. [Online]. Available: http://dl.acm.org/citation.cfm?id=2362793.2362820
-
(2012)
Proceedings of the 21st USENIX conference on Security symposium, ser. Security’12
, pp. 27-27
-
-
Xu, R.1
Saïdi, H.2
Anderson, R.3
-
16
-
-
84874435442
-
Appguard: enforcing user requirements on android apps
-
Berlin, Heidelberg: Springer-Verlag, [Online]. Available
-
M. Backes, S. Gerling, C. Hammer, M. Maffei, and P. von Styp-Rekowsky, “Appguard: enforcing user requirements on android apps,” in Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, ser. TACAS’13. Berlin, Heidelberg: Springer-Verlag, 2013, pp. 543–548. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-36742-7_39
-
(2013)
Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, ser. TACAS’13
, pp. 543-548
-
-
Backes, M.1
Gerling, S.2
Hammer, C.3
Maffei, M.4
von Styp-Rekowsky, P.5
-
17
-
-
84869790502
-
Dr. android and mr. hide: fine-grained permissions in android applications
-
New York, NY, USA: ACM, [Online]. Available
-
J. Jeon, K. K. Micinski, J. A. Vaughan, A. Fogel, N. Reddy, J. S. Foster, and T. Millstein, “Dr. android and mr. hide: fine-grained permissions in android applications,” in Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM ’12. New York, NY, USA: ACM, 2012, pp. 3–14. [Online]. Available: http://doi.acm.org/10.1145/2381934.2381938
-
(2012)
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM ’12
, pp. 3-14
-
-
Jeon, J.1
Micinski, K. K.2
Vaughan, J. A.3
Fogel, A.4
Reddy, N.5
Foster, J. S.6
Millstein, T.7
-
18
-
-
85180632116
-
-
aug
-
“Google mirror api,” aug 2013, https://code.google.com/p/google-api-java-client/wiki/APIs#Google_Mirror_API.
-
(2013)
Google mirror api
-
-
-
19
-
-
84877978007
-
-
aug
-
“Google glass,” aug 2013, https://developers.google.com/glass/.
-
(2013)
Google glass
-
-
-
20
-
-
85180626447
-
-
aug
-
“Google cast,” aug 2013, https://developers.google.com/cast.
-
(2013)
Google cast
-
-
-
21
-
-
84901602864
-
-
aug
-
“Virus share,” aug 2013, http://virusshare.com/.
-
(2013)
Virus share
-
-
-
22
-
-
84869388345
-
Pscout: analyzing the android permission specification
-
New York, NY, USA: ACM, [Online]. Available
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “Pscout: analyzing the android permission specification,” in Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS’12. New York, NY, USA: ACM, 2012, pp. 217–228. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382222
-
(2012)
Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS’12
, pp. 217-228
-
-
Au, K. W. Y.1
Zhou, Y. F.2
Huang, Z.3
Lie, D.4
-
23
-
-
84866946869
-
Automatically securing permission-based software by reducing the attack surface: an application to android
-
New York, NY, USA: ACM, [Online]. Available
-
A. Bartel, J. Klein, Y. Le Traon, and M. Monperrus, “Automatically securing permission-based software by reducing the attack surface: an application to android,” in Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ser. ASE 2012. New York, NY, USA: ACM, 2012, pp. 274–277. [Online]. Available: http://doi.acm.org/10.1145/2351676.2351722
-
(2012)
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ser. ASE 2012
, pp. 274-277
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
24
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA: ACM, [Online]. Available
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified,” in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11. New York, NY, USA: ACM, 2011, pp. 627–638. [Online]. Available: http://doi.acm.org/10.1145/2046707.2046779
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11
, pp. 627-638
-
-
Felt, A. P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
25
-
-
0003120218
-
-
B. Schölkopf, C. J. C. Burges, and A. J. Smola, Eds. Cambridge, MA, USA: MIT Press, ch. Fast training of support vector machines using sequential minimal optimization, [Online]. Available
-
J. C. Platt, “Advances in kernel methods,” B. Schölkopf, C. J. C. Burges, and A. J. Smola, Eds. Cambridge, MA, USA: MIT Press, 1999, ch. Fast training of support vector machines using sequential minimal optimization, pp. 185–208. [Online]. Available: http://dl.acm.org/citation.cfm?id=299094.299105
-
(1999)
Advances in kernel methods
, pp. 185-208
-
-
Platt, J. C.1
-
26
-
-
76749092270
-
The weka data mining software: an update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The weka data mining software: an update,” ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10–18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I. H.6
-
28
-
-
10044283198
-
The Optimality of Naive Bayes
-
Barr and Z. Markov, Eds. AAAI Press, [Online]. Available
-
H. Zhang, “The Optimality of Naive Bayes.” in FLAIRS Conference, V. Barr and Z. Markov, Eds. AAAI Press, 2004. [Online]. Available: http://www.cs.unb.ca/profs/hzhang/publications/FLAIRS04ZhangH.pdf
-
(2004)
FLAIRS Conference
-
-
Zhang, H.1
-
29
-
-
84863426387
-
The soot framework for java program analysis: a retrospective
-
P. Lam, E. Bodden, O. Lhoták, and L. Hendren, “The soot framework for java program analysis: a retrospective,” in Cetus Users and Compiler Infastructure Workshop (CETUS 2011), 2011.
-
(2011)
Cetus Users and Compiler Infastructure Workshop (CETUS 2011)
-
-
Lam, P.1
Bodden, E.2
Lhoták, O.3
Hendren, L.4
-
30
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
R. Kohavi, “A study of cross-validation and bootstrap for accuracy estimation and model selection.” Morgan Kaufmann, 1995, pp. 1137–1143.
-
(1995)
Morgan Kaufmann
, pp. 1137-1143
-
-
Kohavi, R.1
-
31
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Washington, DC, USA: IEEE Computer Society, [Online]. Available
-
Y. Zhou and X. Jiang, “Dissecting android malware: Characterization and evolution,” in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 95–109. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.16
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
32
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
New York, NY, USA: ACM, [Online]. Available
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, “Unsafe exposure analysis of mobile in-app advertisements,” in Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, ser. WISEC’12. New York, NY, USA: ACM, 2012, pp. 101–112. [Online]. Available: http://doi.acm.org/10.1145/2185448.2185464
-
(2012)
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, ser. WISEC’12
, pp. 101-112
-
-
Grace, M. C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
33
-
-
85180629780
-
-
aug
-
“The google maps geolocation api,” aug 2013, https://developers.google.com/maps/documentation/business/geolocation/.
-
(2013)
The google maps geolocation api
-
-
-
34
-
-
85180634239
-
-
aug
-
“Android api differences report,” aug 2013, https://developer.android.com/sdk/api_diff/9/changes.html.
-
(2013)
Android api differences report
-
-
-
35
-
-
85180634239
-
-
aug
-
“Android api differences report,” aug 2013, https://developer.android.com/sdk/api_diff/17/changes.html.
-
(2013)
Android api differences report
-
-
-
36
-
-
85180634239
-
-
aug
-
“Android api differences report,” aug 2013, https://developer.android.com/sdk/api_diff/18/changes.html.
-
(2013)
Android api differences report
-
-
-
37
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA: ACM, [Online]. Available
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified,” in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11. New York, NY, USA: ACM, 2011, pp. 627–638. [Online]. Available: http://doi.acm.org/10.1145/2046707.2046779
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11
, pp. 627-638
-
-
Felt, A. P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
38
-
-
85180631864
-
-
apr
-
“Scandroid,” apr 2013, https://github.com/SCanDroid.
-
(2013)
Scandroid
-
-
-
40
-
-
85180622825
-
-
Apr
-
“cyanogenmod,” Apr. 2013, http://www.cyanogenmod.org/.
-
(2013)
cyanogenmod
-
-
-
41
-
-
85180635755
-
Flowdroid: Precise context-, flow-, object-sensitive and lifecycle-aware taint analysis for android apps
-
C. Fritz, S. Arzt, S. Rasthofer, and E. Bodden, “Flowdroid: Precise context-, flow-, object-sensitive and lifecycle-aware taint analysis for android apps,” in Submitted to ACM CCS 2013.
-
(2013)
Submitted to ACM CCS
-
-
Fritz, C.1
Arzt, S.2
Rasthofer, S.3
Bodden, E.4
-
42
-
-
67650837962
-
Merlin: Specification inference for explicit information flow problems
-
Jun. [Online]. Available
-
B. Livshits, A. V. Nori, S. K. Rajamani, and A. Banerjee, “Merlin: Specification inference for explicit information flow problems,” SIGPLAN Not., vol. 44, no. 6, pp. 75–86, Jun. 2009. [Online]. Available: http://doi.acm.org/10.1145/1543135.1542485
-
(2009)
SIGPLAN Not
, vol.44
, Issue.6
, pp. 75-86
-
-
Livshits, B.1
Nori, A. V.2
Rajamani, S. K.3
Banerjee, A.4
-
43
-
-
84991870594
-
A comparison of event models for naive bayes anti-spam e-mail filtering
-
Stroudsburg, PA, USA: Association for Computational Linguistics, [Online]. Available
-
K.-M. Schneider, “A comparison of event models for naive bayes anti-spam e-mail filtering,” in Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 1, ser. EACL’03. Stroudsburg, PA, USA: Association for Computational Linguistics, 2003, pp. 307–314. [Online]. Available: http://dx.doi.org/10.3115/1067807.1067848
-
(2003)
Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - Volume 1, ser. EACL’03
, pp. 307-314
-
-
Schneider, K.-M.1
-
44
-
-
26844565732
-
Active platform security through intrusion detection using naive bayesian network for anomaly detection
-
A. A. Sebyala, T. Olukemi, L. Sacks, and D. L. Sacks, “Active platform security through intrusion detection using naive bayesian network for anomaly detection,” in In: Proceedings of London communications symposium, 2002.
-
(2002)
Proceedings of London communications symposium
-
-
Sebyala, A. A.1
Olukemi, T.2
Sacks, L.3
Sacks, D. L.4
-
45
-
-
84864033989
-
Android permissions: a perspective combining risks and benefits
-
New York, NY, USA: ACM, [Online]. Available
-
B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, “Android permissions: a perspective combining risks and benefits,” in Proceedings of the 17th ACM symposium on Access Control Models and Technologies, ser. SACMAT’12. New York, NY, USA: ACM, 2012, pp. 13–22. [Online]. Available: http://doi.acm.org/10.1145/2295136.2295141
-
(2012)
Proceedings of the 17th ACM symposium on Access Control Models and Technologies, ser. SACMAT’12
, pp. 13-22
-
-
Sarma, B. P.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
46
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
New York, NY, USA: ACM, [Online]. Available
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, “Using probabilistic generative models for ranking risks of android apps,” in Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS’12. New York, NY, USA: ACM, 2012, pp. 241–252. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382224
-
(2012)
Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS’12
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
47
-
-
84879543890
-
Mast: triage for market-scale mobile malware analysis
-
New York, NY, USA: ACM, [Online]. Available
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck, “Mast: triage for market-scale mobile malware analysis,” in Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, ser. WiSec’13. New York, NY, USA: ACM, 2013, pp. 13–24. [Online]. Available: http://doi.acm.org/10.1145/2462096.2462100
-
(2013)
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, ser. WiSec’13
, pp. 13-24
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
|