-
4
-
-
85180550358
-
-
DroidBench. http://sseblog.ec-spride.de/tools/droidbench/.
-
DroidBench
-
-
-
8
-
-
84910658019
-
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
-
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS), 2014.
-
(2014)
Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
9
-
-
84907029013
-
FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. In Proceedings of the Annual ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2014.
-
(2014)
Proceedings of the Annual ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
12
-
-
0026243790
-
Efficiently Computing Static Single Assignment Form and the Control Dependence Graph
-
Oct
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently Computing Static Single Assignment Form and the Control Dependence Graph. ACM Trans. Program. Lang. Syst., 13(4):451-490, Oct. 1991.
-
(1991)
ACM Trans. Program. Lang. Syst
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B. K.3
Wegman, M. N.4
Zadeck, F. K.5
-
13
-
-
85076889619
-
TaintDroid: an Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the USENIX Conference on Operating Systems Design and Implementation (OSDI), 2010.
-
(2010)
Proceedings of the USENIX Conference on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
16
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011.
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Felt, A. P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
19
-
-
84864334986
-
RiskRanker: Scalable and Accurate Zero-day Android Malware Detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 2012.
-
(2012)
Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
20
-
-
84907024978
-
Race Detection for Event-Driven Mobile Applications
-
C.-H. Hsiao, C. L. Pereira, J. Yu, G. a. Pokam, S. Narayanasamy, P. M. Chen, Z. Kong, and J. Flinn. Race Detection for Event-Driven Mobile Applications. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2014.
-
(2014)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Hsiao, C.-H.1
Pereira, C. L.2
Yu, J.3
Pokam, G. a.4
Narayanasamy, S.5
Chen, P. M.6
Kong, Z.7
Flinn, J.8
-
21
-
-
84869790502
-
Dr. Android and Mr. Hide: Fine-Grained Permissions in Android Applications
-
J. Jeon, K. K. Micinski, J. A. Vaughan, A. Fogel, N. Reddy, J. S. Foster, and T. Millstein. Dr. Android and Mr. Hide: Fine-Grained Permissions in Android Applications. In In Proceedings of The ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2012.
-
(2012)
Proceedings of The ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Jeon, J.1
Micinski, K. K.2
Vaughan, J. A.3
Fogel, A.4
Reddy, N.5
Foster, J. S.6
Millstein, T.7
-
23
-
-
84869416020
-
CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012.
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
27
-
-
84874865861
-
AppsPlayground: Automatic Security Analysis of Smartphone Applications
-
New York, NY, USA, ACM
-
V. Rastogi, Y. Chen, and W. Enck. AppsPlayground: Automatic Security Analysis of Smartphone Applications. In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), pages 209-220, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY)
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
31
-
-
84869439259
-
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS), 2012.
-
(2012)
Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|