-
1
-
-
85180404796
-
-
electronista News, January
-
“Trend Micro: Android much less secure than iPhone, ” electronista News, January 2011. http://www.electronista.com/articles/11/01/11/trend.micro.warns. android.inherently.vulnerable/.
-
(2011)
Trend Micro: Android much less secure than iPhone
-
-
-
2
-
-
78650888452
-
Why Android App Security Is Better Than for the iPhone
-
August
-
“Why Android App Security Is Better Than for the iPhone, ” PCWorld News. August 2010. http://www.pcworld.com/businesscenter/article/202758/why_android_app_security_is_better_than_for_the_iphone.html.
-
(2010)
PCWorld News
-
-
-
4
-
-
85180413957
-
Smartphone Security Smackdown: iPhone vs. Android
-
InformationWeek, July
-
“Smartphone Security Smackdown: iPhone vs. Android, ” InformationWeek, July 2011. http://www.informationweek.com/news/security/mobile/231000953.
-
(2011)
-
-
-
5
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified, ” in Proceedings of the 18th ACM conference on Computer and communications security, 2011, pp. 627-638.
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security
, pp. 627-638
-
-
Felt, A. P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
6
-
-
85052638466
-
Apple Approves, Pulls Flashlight App with Hidden Tethering Mode
-
July
-
C. Sorrel, “Apple Approves, Pulls Flashlight App with Hidden Tethering Mode, ” Wired. July, 2010. http://www.wired.com/gadgetlab/2010/07/apple-approvespulls-flashlight-app-with-hidden-tethering-mode.
-
(2010)
Wired
-
-
Sorrel, C.1
-
7
-
-
84865574920
-
Android and Security
-
Feb 02
-
H. Lockheimer, “Android and Security, ” Google Mobile Blog, Feb 02, 2012. http://googlemobile.blogspot.com/2012/02/android-and-security.html.
-
(2012)
Google Mobile Blog
-
-
Lockheimer, H.1
-
8
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android permissions: User attention, comprehension, and behavior, ” in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2012.
-
(2012)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
-
-
Felt, A. P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
10
-
-
85180406871
-
-
“Apple, Entitlement Key Reference, ” http://developer.apple.com/library/mac/#documentation/Miscellaneous/Reference/EntitlementKeyReference/Chapters/AboutEntitlements.html.
-
Apple, Entitlement Key Reference
-
-
-
13
-
-
65049083334
-
Improving static resolution of dynamic class loading in java using dynamically gathered environment information
-
June
-
J. Sawin and A. Rountev, “Improving static resolution of dynamic class loading in java using dynamically gathered environment information, ” Automated Software Engineering, vol. 16, pp. 357-381, June 2009.
-
(2009)
Automated Software Engineering
, vol.16
, pp. 357-381
-
-
Sawin, J.1
Rountev, A.2
-
14
-
-
85180412016
-
IDApro, a multi-processor disassembler and debugger
-
“IDApro, a multi-processor disassembler and debugger, ” Hex-Rays, http://www.hex-rays.com/products/ida/index.shtml.
-
Hex-Rays
-
-
-
15
-
-
85180410157
-
The Objective-C Runtime: Understanding and Abusing
-
Nemo, “The Objective-C Runtime: Understanding and Abusing, ” phrack, Volume 4, Issue 66, http://www.phrack.org/issues.html?issue=66&id=4.
-
phrack
, vol.4
, Issue.66
-
-
Nemo1
-
16
-
-
84888331381
-
PiOS: Detecting Privacy Leaks in iOS Applications
-
San Diego, CA, February
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, “PiOS: Detecting Privacy Leaks in iOS Applications, ” in Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2011.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
17
-
-
85180418930
-
-
XE Currency on Android: https://play.google.com/store/apps/details?id=com.xe.currency
-
XE Currency on iOS: http://itunes.apple.com/app/xe-currency/id315241195, XE Currency on Android: https://play.google.com/store/apps/details?id=com.xe.currency.
-
XE Currency on iOS
-
-
-
18
-
-
85180402078
-
-
iOS version: Android version: https://play.google.com/store/apps/details?id=com.zynga.words
-
Words With Friends Free, iOS version: http://itunes.apple.com/app/words-with-friends-free/id321916506, Android version: https://play.google.com/store/apps/details?id=com.zynga.words.
-
Words With Friends Free
-
-
-
20
-
-
85180406340
-
-
Flurry Product Updates, http://blog.flurry.com/updates/bid/33715/New-Flurry-SDK-Available-for-iPhone-OS-4-0-iOS.
-
Flurry Product Updates
-
-
-
23
-
-
85037073388
-
Privilege escalation attacks on android
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, “Privilege escalation attacks on android, ” in Proceedings of the 13th international conference on Information security, 2011, pp. 346-360.
-
(2011)
Proceedings of the 13th international conference on Information security
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
24
-
-
85046879731
-
Permission re-delegation: attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, “Permission re-delegation: attacks and defenses, ” in Proceedings of the 20th USENIX conference on Security, 2011.
-
(2011)
Proceedings of the 20th USENIX conference on Security
-
-
Felt, A. P.1
Wang, H. J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
25
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
Feb
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry, “Towards taming privilege-escalation attacks on android, ” in 19th Annual Network & Distributed System Security Symposium, Feb 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
27
-
-
85025700509
-
A study of android application security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security, ” in Proceedings of the 20th USENIX Security Symposium, 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
28
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Feb
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, ” in 19th Annual Network & Distributed System Security Symposium (NDSS), Feb 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
29
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
L.-K. Yan and H. Yin, “Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis, ” in Proceedings of the 21st USENIX Security Symposium, 2012.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
-
-
Yan, L.-K.1
Yin, H.2
-
30
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. G. u. c. Kayacik, P. C. van Oorschot, and A. Somayaji, “A methodology for empirical analysis of permission-based security models and its application to android, ” in Proceedings of the 17th ACM conference on Computer and communications security, 2010, pp. 73-84.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H. G. u. c.2
van Oorschot, P. C.3
Somayaji, A.4
-
31
-
-
77950851532
-
Semantically rich application-centric security in android
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel, “Semantically rich application-centric security in android, ” in Proceedings of the Annual Computer Security Applications Conference, 2009, pp. 340-349.
-
(2009)
Proceedings of the Annual Computer Security Applications Conference
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
32
-
-
80755187778
-
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, “These aren't the droids you're looking for: retrofitting android to protect data from imperious applications, ” in Proceedings of the 18th ACM conference on computer and communications security, 2011, pp. 639-652.
-
(2011)
Proceedings of the 18th ACM conference on computer and communications security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
33
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
Feb
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang, “Systematic detection of capability leaks in stock android smartphones, ” in 19th Annual Network & Distributed System Security Symposium, Feb 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
36
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner, “Addroid: Privilege separation for applications and advertisers in android, ” in Proceedings of 7th ACM Symposium on Information, Computer and Communications Security, 2012.
-
(2012)
Proceedings of 7th ACM Symposium on Information, Computer and Communications Security
-
-
Pearce, P.1
Felt, A. P.2
Nunez, G.3
Wagner, D.4
-
38
-
-
79955570859
-
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones, ” in Proceedings of the 9th USENIX conference on operating systems design and implementation, 2010.
-
(2010)
Proceedings of the 9th USENIX conference on operating systems design and implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
40
-
-
79961035117
-
Analyzing inter-application communication in android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, “Analyzing inter-application communication in android, ” in Proceedings of the 9th international conference on Mobile systems, applications, and services, 2011, pp. 239-252.
-
(2011)
Proceedings of the 9th international conference on Mobile systems, applications, and services
, pp. 239-252
-
-
Chin, E.1
Felt, A. P.2
Greenwood, K.3
Wagner, D.4
-
42
-
-
0016572913
-
A vector space model for automatic indexing
-
November
-
G. Salton, A. Wong, and C. S. Yang, “A vector space model for automatic indexing, ” Communications of the ACM, vol. 18, pp. 613-620, November 1975.
-
(1975)
Communications of the ACM
, vol.18
, pp. 613-620
-
-
Salton, G.1
Wong, A.2
Yang, C. S.3
-
43
-
-
0001116877
-
Binary Codes Capable of Correcting Deletions, Insertions and Reversals
-
V. Levenshtein, “Binary Codes Capable of Correcting Deletions, Insertions and Reversals, ” Soviet Physics Doklady, vol. 10, p. 707, 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, pp. 707
-
-
Levenshtein, V.1
|