-
2
-
-
84870633205
-
-
April [Online]. Available:http://developer.android.eom/guide/topics/fundamentals.html Components
-
“Android application components, ” http://developer.android.com/guide/topics/fundamentals.html#Components, April 2012. [Online]. Available:http://developer.android.eom/guide/topics/fundamentals.html# Components
-
(2012)
Android application components
-
-
-
3
-
-
84948972811
-
The cartesian product algorithm: Simple and precise type inference of parametric polymorphism
-
London, UK, UK: Springer-Verlag, [Online], Available
-
O. Agesen, “The cartesian product algorithm: Simple and precise type inference of parametric polymorphism, ” in Proceedings of the 9th European Conference on Object-Oriented Programming, ser. ECOOP '95. London, UK, UK: Springer-Verlag, 1995, pp. 2-26. [Online], Available: http://dl.acm.org/citation.cfm?id=646153.679533
-
(1995)
Proceedings of the 9th European Conference on Object-Oriented Programming, ser. ECOOP '95
, pp. 2-26
-
-
Agesen, O.1
-
4
-
-
85178287263
-
Drebin: Effective and explainable detection of android malware in your pocket
-
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, “Drebin: Effective and explainable detection of android malware in your pocket, ” in Proceedings of the 21th Network and Distributed System Security Symposium (NDSS), 2014.
-
(2014)
Proceedings of the 21th Network and Distributed System Security Symposium (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
5
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
New York, NY, USA: ACM, [Online], Available
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel, “Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps” in Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, ser. PLDI'14. New York, NY, USA: ACM, 2014, pp. 259-269. [Online], Available: http://doi.acm.org/10.1145/2594291.2594299
-
(2014)
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, ser. PLDI'14
, pp. 259-269
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
6
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
New York, NY, USA: ACM, [Online], Available
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “Pscout: Analyzing the android permission specification, ” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS'12. New York, NY, USA: ACM, 2012, pp. 217-228. [Online], Available: http://doi.acm.org/10.1145/2382196.2382222
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS'12
, pp. 217-228
-
-
Au, K. W. Y.1
Zhou, Y. F.2
Huang, Z.3
Lie, D.4
-
7
-
-
0031705048
-
Path-sensitive value-flow analysis
-
New York, NY, USA: ACM, [Online], Available
-
R. Bodik and S. Anik, “Path-sensitive value-flow analysis, ” in Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ser. POPL'98. New York, NY, USA: ACM, 1998, pp. 237-251. [Online], Available: http://doi.acm.org/10.1145/268946.268966
-
(1998)
Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ser. POPL'98
, pp. 237-251
-
-
Bodik, R.1
Anik, S.2
-
8
-
-
84888341014
-
Towards taming privilege-escalation attacks on android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry, “Towards taming privilege-escalation attacks on android, ” in Proceedings of the 19th Network and Distributed System Security Symposium (NDSS), 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS)
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
9
-
-
84939505060
-
Interprocedural constant propagation
-
New York, NY, USA: ACM, [Online], Available
-
D. Callahan, K. D. Cooper, K. Kennedy, and L. Torczon, “Interprocedural constant propagation, ” in Proceedings of the 1986 SIGPLAN Symposium on Compiler Construction, ser. SIGPLAN'86. New York, NY, USA: ACM, 1986, pp. 152-161. [Online], Available: http://doi.acm.org/10.1145/12276.13327
-
(1986)
Proceedings of the 1986 SIGPLAN Symposium on Compiler Construction, ser. SIGPLAN'86
, pp. 152-161
-
-
Callahan, D.1
Cooper, K. D.2
Kennedy, K.3
Torczon, L.4
-
10
-
-
84879543890
-
Mast: Triage for market-scale mobile malware analysis
-
New York, NY, USA: ACM, [Online], Available
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck, “Mast: Triage for market-scale mobile malware analysis, ” in Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WiSec'13. New York, NY, USA: ACM, 2013, pp. 13-24. [Online], Available: http://doi.acm.org/10.1145/2462096. 2462100
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WiSec'13
, pp. 13-24
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
11
-
-
85066347237
-
Quire: Lightweight provenance for smart phone operating systems
-
San Francisco, CA, Aug
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach, “Quire: Lightweight provenance for smart phone operating systems, ” in Proceedings of the 20th USENIX conference on Security, San Francisco, CA, Aug. 2011.
-
(2011)
Proceedings of the 20th USENIX conference on Security
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D. S.5
-
12
-
-
84888331381
-
Pios: Detecting privacy leaks in ios applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, “Pios: Detecting privacy leaks in ios applications, ” in Proceedings of the 18th Network and Distributed System Security Symposium (NDSS), 2011.
-
(2011)
Proceedings of the 18th Network and Distributed System Security Symposium (NDSS)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
13
-
-
79955570859
-
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA: USENIX Association, [Online], Available
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones, ” in Proceedings ofthe 9th USENIX conference on Operating systems design and implementation, ser. OSDI'IO. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-6. [Online], Available: http://dl.acm.org/citation.cfm?id=1924943. 1924971
-
(2010)
Proceedings ofthe 9th USENIX conference on Operating systems design and implementation, ser. OSDI'IO
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
14
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA: USENIX Association, [Online], Available
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security, ” in Proceedings of the 20th USENIX conference on Security. Berkeley, CA, USA: USENIX Association, 2011, pp. 21-21. [Online], Available: http://dl.acm.org/citation.cfm?id=2028067.2028088
-
(2011)
Proceedings of the 20th USENIX conference on Security
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
15
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA: ACM, [Online], Available
-
W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone application certification, ” in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS'09. New York, NY, USA: ACM, 2009, pp. 235-245. [Online], Available: http://doi.acm.org/10.1145/1653662.1653691
-
(2009)
Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS'09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
16
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA: ACM, [Online], Available
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified, ” in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS'll. New York, NY, USA: ACM, 2011, pp. 627-638. [Online], Available: http://doi.acm.org/10.1145/2046707.2046779
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS'll
, pp. 627-638
-
-
Felt, A. P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
17
-
-
85046879731
-
Permission re-delegation: attacks and defenses
-
Berkeley, CA, USA: USENIX Association, [Online]. Available
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, “Permission re-delegation: attacks and defenses, ” in Proceedings of the 20th USENIX conference on Security, ser. SEC'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 22-22. [Online]. Available: http://dl.acm.org/citation.cfm?id=2028067.2028089
-
(2011)
Proceedings of the 20th USENIX conference on Security, ser. SEC'11
, pp. 22-22
-
-
Felt, A. P.1
Wang, H. J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
18
-
-
84863084209
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
Berlin, Heidelberg: Springer-Verlag, [Online], Available
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen, “Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale, ” in Proceedings of the 5th International Conference on Trust and Trustworthy Computing, ser. TRUST'12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 291-307. [Online], Available: http://dx.doi.org/10.1007/978-3-642-30921-2_17
-
(2012)
Proceedings of the 5th International Conference on Trust and Trustworthy Computing, ser. TRUST'12
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
19
-
-
84993660403
-
Checking app behavior against app descriptions
-
New York, NY, USA: ACM, [Online], Available
-
A. Gorla, I. Tavecchia, F. Gross, and A. Zeller, “Checking app behavior against app descriptions, ” in Proceedings of the 36th International Conference on Software Engineering, ser. ICSE 2014. New York, NY, USA: ACM, 2014, pp. 1025-1035. [Online], Available: http://doi.acm.org/10.1145/2568225.2568276
-
(2014)
Proceedings of the 36th International Conference on Software Engineering, ser. ICSE 2014
, pp. 1025-1035
-
-
Gorla, A.1
Tavecchia, I.2
Gross, F.3
Zeller, A.4
-
20
-
-
85165758676
-
Systematic detection of capability leaks in stock android smartphones
-
M. Grace, Y. Zhou, Z. Wang, and X. Jiang, “Systematic detection of capability leaks in stock android smartphones, ” in Proceedings of the 19th Network and Distributed System Security Symposium (NDSS), 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS)
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
21
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
New York, NY, USA: ACM, [Online], Available
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, “Riskranker: Scalable and accurate zero-day android malware detection, ” in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys'12. New York, NY, USA: ACM, 2012, pp. 281-294. [Online], Available: http://doi.acm.org/10.1145/2307636.2307663
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys'12
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
22
-
-
85180417656
-
Comparing mobile privacy protection through cross-platform applications
-
J. Han, Q. Yan, D. Gao, J. Zhou, and R. Deng, “Comparing mobile privacy protection through cross-platform applications, ” in Proceedings of the 20th Network and Distributed System Security Symposium (NDSS), 2013.
-
(2013)
Proceedings of the 20th Network and Distributed System Security Symposium (NDSS)
-
-
Han, J.1
Yan, Q.2
Gao, D.3
Zhou, J.4
Deng, R.5
-
23
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
New York, NY, USA: ACM, [Online], Available
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, “These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications, ” in Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS'll. New York, NY, USA: ACM, 2011, pp. 639-652. [Online], Available: http://doi.acm.org/10.1145/2046707.2046780
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS'll
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
24
-
-
84976844558
-
Interprocedural slicing using dependence graphs
-
Jun. [Online], Available
-
S. Horwitz, T. Reps, and D. Binkley, “Interprocedural slicing using dependence graphs, ” SIGPLAN Not., vol. 23, no. 7, pp. 3546, Jun. 1988. [Online], Available: http://doi.acm.org/10.1145/960116.53994
-
(1988)
SIGPLAN Not
, vol.23
, Issue.7
, pp. 3546
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
25
-
-
84914118062
-
From zygote to morula: Fortifying weakened aslr on android
-
Washington, DC, USA: IEEE Computer Society, [Online], Available
-
B. Lee, L. Lu, T. Wang, T. Kim, and W. Lee, “From zygote to morula: Fortifying weakened aslr on android, ” in Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14. Washington, DC, USA: IEEE Computer Society, 2014, pp. 424439. [Online], Available: http://dx.doi.org/10.1109/SP.2014.34
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14
, pp. 424439
-
-
Lee, B.1
Lu, L.2
Wang, T.3
Kim, T.4
Lee, W.5
-
26
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
New York, NY, USA: ACM, [Online], Available
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, “Chex: Statically vetting android apps for component hijacking vulnerabilities, ” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS'12. New York, NY, USA: ACM, 2012, pp. 229-240. [Online], Available: http://doi.acm.org/10.1145/2382196. 2382223
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS'12
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
27
-
-
84888985223
-
Preventing accidental data disclosure in modern operating systems
-
New York, NY, USA: ACM, [Online], Available
-
A. Nadkarni and W. Enck, “Preventing accidental data disclosure in modern operating systems, ” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ser. CCS '13. New York, NY, USA: ACM, 2013, pp. 1029-1042. [Online], Available: http://doi.acm.Org/10.l 145/2508859.2516677
-
(2013)
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ser. CCS '13
, pp. 1029-1042
-
-
Nadkarni, A.1
Enck, W.2
-
28
-
-
84976819375
-
Object-oriented type inference
-
New York, NY, USA: ACM, [Online], Available
-
J. Palsberg and M. I. Schwartzbach, “Object-oriented type inference, ” in Conference Proceedings on Object-oriented Programming Systems, Languages, and Applications, ser. OOPSLA'91. New York, NY, USA: ACM, 1991, pp. 146-161. [Online], Available: http://doi.acm. org/10.1145/117954.117965
-
(1991)
Conference Proceedings on Object-oriented Programming Systems, Languages, and Applications, ser. OOPSLA'91
, pp. 146-161
-
-
Palsberg, J.1
Schwartzbach, M. I.2
-
29
-
-
85019170256
-
Whyper: Towards automating risk assessment of mobile applications
-
Washington, D.C.: USENIX, [Online]. Available
-
R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, “Whyper: Towards automating risk assessment of mobile applications, ” in Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). Washington, D.C.: USENIX, 2013, pp. 527-542. [Online]. Available: https://www.usenix.org/conference/usenixsecurity13/technical- sessions/presentation/pandita
-
(2013)
Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)
, pp. 527-542
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
30
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
ACM
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, “Using probabilistic generative models for ranking risks of android apps, ” in Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 2012, pp. 241-252.
-
(2012)
Proceedings of the 2012 ACM conference on Computer and communications security
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
31
-
-
84874865861
-
Appsplayground: Automatic security analysis of smartphone applications
-
New York, NY, USA: ACM, [Online], Available
-
V. Rastogi, Y. Chen, and W. Enck, “Appsplayground: Automatic security analysis of smartphone applications, ” in Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY'13. New York, NY, USA: ACM, 2013, pp. 209-220. [Online], Available: http://doi.acm.org/10.1145/2435349.2435379
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY'13
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
33
-
-
84903733085
-
Investigating user privacy in android ad libraries
-
Citeseer
-
R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen, “Investigating user privacy in android ad libraries, ” in Workshop on Mobile Security Technologies (MoST). Citeseer, 2012.
-
(2012)
Workshop on Mobile Security Technologies (MoST)
-
-
Stevens, R.1
Gibler, C.2
Crussell, J.3
Erickson, J.4
Chen, H.5
-
34
-
-
84914140121
-
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
-
Washington, DC, USA: IEEE Computer Society, [Online], Available
-
L. Xing, X. Pan, R. Wang, K. Yuan, and X. Wang, “Upgrading your android, elevating my malware: Privilege escalation through mobile os updating, ” in Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14. Washington, DC, USA: IEEE Computer Society, 2014, pp. 393^408. [Online], Available: http://dx.doi.org/10.1109/SP.2014.32
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14
, pp. 393-408
-
-
Xing, L.1
Pan, X.2
Wang, R.3
Yuan, K.4
Wang, X.5
-
35
-
-
84889041424
-
Appintent: analyzing sensitive data transmission in android for privacy leakage detection
-
New York, NY, USA: ACM, [Online], Available
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang, “Appintent: analyzing sensitive data transmission in android for privacy leakage detection, ” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ser. CCS '13. New York, NY, USA: ACM, 2013, pp. 1043-1054. [Online], Available: http://doi.acm.0rg/lO.l 145/2508859.2516676
-
(2013)
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ser. CCS '13
, pp. 1043-1054
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X. S.6
-
36
-
-
84869757378
-
Smartdroid: An automatic system for revealing ui-based trigger conditions in android applications
-
New York, NY, USA: ACM, [Online], Available
-
C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou, “Smartdroid: An automatic system for revealing ui-based trigger conditions in android applications, ” in Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM'12. New York, NY, USA: ACM, 2012, pp. 93-104. [Online], Available: http://doi.acm.org/10.1145/2381934.2381950
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM'12
, pp. 93-104
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Han, X.6
Zou, W.7
-
37
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
New York, NY, USA: ACM, [Online], Available
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, “Detecting repackaged smartphone applications in third-party android marketplaces, ” in Proceedings of the Second ACM Conference on Data and Application Security and Privacy, ser. CODASPY'12. New York, NY, USA: ACM, 2012, pp. 317-326. [Online], Available: http://doi.acm.org/10.1145/2133601.2133640
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, ser. CODASPY'12
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
38
-
-
84914115732
-
The peril of fragmentation: Security hazards in android device driver customizations
-
Washington, DC, USA: IEEE Computer Society, [Online], Available
-
X. Zhou, Y. Lee, N. Zhang, M. Naveed, and X. Wang, “The peril of fragmentation: Security hazards in android device driver customizations, ” in Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14. Washington, DC, USA: IEEE Computer Society, 2014, pp. 409^423. [Online], Available: http://dx.doi.org/10.1109/SP.2014.33
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14
, pp. 409423
-
-
Zhou, X.1
Lee, Y.2
Zhang, N.3
Naveed, M.4
Wang, X.5
-
39
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Washington, DC, USA: IEEE Computer Society, [Online], Available
-
Y. Zhou and X. Jiang, “Dissecting android malware: Characterization and evolution, ” in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP'12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 95-109. [Online], Available: http://dx.doi.org/10.1109/SP.2012.16
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP'12
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
41
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, ” in Proceedings of the 19th Network and Distributed System Security Symposium (NDSS), 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|