Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection
暂无分享,去创建一个
Sencun Zhu | Prasant Mohapatra | Zizhan Zheng | Hao Fu | Hao Fu | Sencun Zhu | P. Mohapatra | Zizhan Zheng
[1] Yao Guo,et al. PERUIM: understanding mobile application privacy with permission-UI mapping , 2016, UbiComp.
[2] Dawn Xiaodong Song,et al. Contextual Policy Enforcement in Android Applications with Permission Event Graphs , 2013, NDSS.
[3] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[4] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[5] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[6] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[7] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[8] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[9] Xianbin Wang,et al. Incremental clustering for human activity detection based on phone sensor data , 2016, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[10] David A. Wagner,et al. Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.
[11] Alessandra Gorla,et al. Detecting Behavior Anomalies in Graphical User Interfaces , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[12] Dan Grossman,et al. AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems , 2016, CCS.
[13] Mohammad Emtiyaz Khan,et al. SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[14] Prasant Mohapatra,et al. LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[15] Nataniel P. Borges. Data flow oriented UI testing: exploiting data flows and UI elements to test Android applications , 2017, ISSTA.
[16] Peng Wang,et al. AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction , 2014, ICSE.
[17] Parth H. Pathak,et al. FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[18] Xiangyu Zhang,et al. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps , 2015, USENIX Security Symposium.
[19] Yuan Zhang,et al. Rethinking Permission Enforcement Mechanism on Mobile Systems , 2016, IEEE Transactions on Information Forensics and Security.
[20] Christopher Krügel,et al. What the App is That? Deception and Countermeasures in the Android User Interface , 2015, 2015 IEEE Symposium on Security and Privacy.
[21] David A. Wagner,et al. The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[22] Xin Chen,et al. DroidJust: automated functionality-aware privacy leakage analysis for Android applications , 2015, WISEC.
[23] Suman Nath,et al. Appstract: on-the-fly app content semantics with better privacy , 2016, MobiCom.
[24] Ahmad-Reza Sadeghi,et al. ConXsense: automated context classification for context-aware access control , 2013, AsiaCCS.
[25] Ming-Hsuan Yang,et al. Incremental Learning for Robust Visual Tracking , 2008, International Journal of Computer Vision.