메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID (OPERATING SYSTEM); AUTOMATION; DATA FLOW ANALYSIS; DATA PRIVACY; MOBILE SECURITY;

EID: 85180549026     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23287     Document Type: Conference Paper
Times cited : (66)

References (41)
  • 2
    • 84870633205 scopus 로고    scopus 로고
    • April [Online]. Available:http://developer.android.eom/guide/topics/fundamentals.html Components
    • “Android application components, ” http://developer.android.com/guide/topics/fundamentals.html#Components, April 2012. [Online]. Available:http://developer.android.eom/guide/topics/fundamentals.html# Components
    • (2012) Android application components
  • 3
    • 84948972811 scopus 로고
    • The cartesian product algorithm: Simple and precise type inference of parametric polymorphism
    • London, UK, UK: Springer-Verlag, [Online], Available
    • O. Agesen, “The cartesian product algorithm: Simple and precise type inference of parametric polymorphism, ” in Proceedings of the 9th European Conference on Object-Oriented Programming, ser. ECOOP '95. London, UK, UK: Springer-Verlag, 1995, pp. 2-26. [Online], Available: http://dl.acm.org/citation.cfm?id=646153.679533
    • (1995) Proceedings of the 9th European Conference on Object-Oriented Programming, ser. ECOOP '95 , pp. 2-26
    • Agesen, O.1
  • 14
    • 85025700509 scopus 로고    scopus 로고
    • A study of android application security
    • Berkeley, CA, USA: USENIX Association, [Online], Available
    • W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security, ” in Proceedings of the 20th USENIX conference on Security. Berkeley, CA, USA: USENIX Association, 2011, pp. 21-21. [Online], Available: http://dl.acm.org/citation.cfm?id=2028067.2028088
    • (2011) Proceedings of the 20th USENIX conference on Security , pp. 21-21
    • Enck, W.1    Octeau, D.2    McDaniel, P.3    Chaudhuri, S.4
  • 18
    • 84863084209 scopus 로고    scopus 로고
    • Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
    • Berlin, Heidelberg: Springer-Verlag, [Online], Available
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen, “Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale, ” in Proceedings of the 5th International Conference on Trust and Trustworthy Computing, ser. TRUST'12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 291-307. [Online], Available: http://dx.doi.org/10.1007/978-3-642-30921-2_17
    • (2012) Proceedings of the 5th International Conference on Trust and Trustworthy Computing, ser. TRUST'12 , pp. 291-307
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 24
    • 84976844558 scopus 로고
    • Interprocedural slicing using dependence graphs
    • Jun. [Online], Available
    • S. Horwitz, T. Reps, and D. Binkley, “Interprocedural slicing using dependence graphs, ” SIGPLAN Not., vol. 23, no. 7, pp. 3546, Jun. 1988. [Online], Available: http://doi.acm.org/10.1145/960116.53994
    • (1988) SIGPLAN Not , vol.23 , Issue.7 , pp. 3546
    • Horwitz, S.1    Reps, T.2    Binkley, D.3
  • 25
    • 84914118062 scopus 로고    scopus 로고
    • From zygote to morula: Fortifying weakened aslr on android
    • Washington, DC, USA: IEEE Computer Society, [Online], Available
    • B. Lee, L. Lu, T. Wang, T. Kim, and W. Lee, “From zygote to morula: Fortifying weakened aslr on android, ” in Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14. Washington, DC, USA: IEEE Computer Society, 2014, pp. 424439. [Online], Available: http://dx.doi.org/10.1109/SP.2014.34
    • (2014) Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14 , pp. 424439
    • Lee, B.1    Lu, L.2    Wang, T.3    Kim, T.4    Lee, W.5
  • 29
    • 85019170256 scopus 로고    scopus 로고
    • Whyper: Towards automating risk assessment of mobile applications
    • Washington, D.C.: USENIX, [Online]. Available
    • R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, “Whyper: Towards automating risk assessment of mobile applications, ” in Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). Washington, D.C.: USENIX, 2013, pp. 527-542. [Online]. Available: https://www.usenix.org/conference/usenixsecurity13/technical- sessions/presentation/pandita
    • (2013) Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13) , pp. 527-542
    • Pandita, R.1    Xiao, X.2    Yang, W.3    Enck, W.4    Xie, T.5
  • 34
    • 84914140121 scopus 로고    scopus 로고
    • Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
    • Washington, DC, USA: IEEE Computer Society, [Online], Available
    • L. Xing, X. Pan, R. Wang, K. Yuan, and X. Wang, “Upgrading your android, elevating my malware: Privilege escalation through mobile os updating, ” in Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14. Washington, DC, USA: IEEE Computer Society, 2014, pp. 393^408. [Online], Available: http://dx.doi.org/10.1109/SP.2014.32
    • (2014) Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14 , pp. 393-408
    • Xing, L.1    Pan, X.2    Wang, R.3    Yuan, K.4    Wang, X.5
  • 38
    • 84914115732 scopus 로고    scopus 로고
    • The peril of fragmentation: Security hazards in android device driver customizations
    • Washington, DC, USA: IEEE Computer Society, [Online], Available
    • X. Zhou, Y. Lee, N. Zhang, M. Naveed, and X. Wang, “The peril of fragmentation: Security hazards in android device driver customizations, ” in Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14. Washington, DC, USA: IEEE Computer Society, 2014, pp. 409^423. [Online], Available: http://dx.doi.org/10.1109/SP.2014.33
    • (2014) Proceedings of the 2014 IEEE Symposium on Security and Privacy, ser. SP'14 , pp. 409423
    • Zhou, X.1    Lee, Y.2    Zhang, N.3    Naveed, M.4    Wang, X.5
  • 39
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Washington, DC, USA: IEEE Computer Society, [Online], Available
    • Y. Zhou and X. Jiang, “Dissecting android malware: Characterization and evolution, ” in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP'12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 95-109. [Online], Available: http://dx.doi.org/10.1109/SP.2012.16
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP'12 , pp. 95-109
    • Zhou, Y.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.