MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
暂无分享,去创建一个
Gang Wang | Fang Liu | Haipeng Cai | Barbara G. Ryder | Karim O. Elish | Danfeng Yao | G. Wang | B. Ryder | D. Yao | Haipeng Cai | Fang Liu
[1] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[2] Aaron Tomb,et al. Multi-App Security Analysis with FUSE: Statically Detecting Android App Collusion , 2014, PPREW-4.
[3] Gang Wang,et al. Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications , 2017, AsiaCCS.
[4] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[5] Yuan Zhang,et al. FineDroid: Enforcing Permissions with System-Wide Application Execution Context , 2015, SecureComm.
[6] Barbara G. Ryder,et al. Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[7] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[8] Jacques Klein,et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[9] Lujo Bauer,et al. Android taint flow analysis for app sets , 2014, SOAP '14.
[10] Vivek Sarkar,et al. Automatic detection of inter-application permission leaks in Android applications , 2013, IBM J. Res. Dev..
[11] Hubert Ritzdorf,et al. Analysis of the communication between colluding applications on modern smartphones , 2012, ACSAC '12.
[12] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[13] Scott Shenker,et al. Spark: Cluster Computing with Working Sets , 2010, HotCloud.
[14] Matthew L. Dering,et al. Composite Constant Propagation: Application to Android Inter-Component Communication Analysis , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[15] Fang Liu,et al. Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce , 2015, CODASPY.
[16] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[17] Eric Bodden,et al. DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[18] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[19] Marco Pistoia,et al. Dynamic detection of inter-application communication vulnerabilities in Android , 2015, ISSTA.
[20] Ahmad-Reza Sadeghi,et al. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.
[21] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[22] Ahmad-Reza Sadeghi,et al. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .
[23] Jeff H. Perkins,et al. Information Flow Analysis of Android Applications in DroidSafe , 2015, NDSS.
[24] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[25] Fuzhen Zhuang,et al. Parallel extreme learning machine for regression based on MapReduce , 2013, Neurocomputing.
[26] Kun Yang,et al. IntentFuzzer: detecting capability leaks of android applications , 2014, AsiaCCS.
[27] Beng Chin Ooi,et al. Distributed data management using MapReduce , 2014, CSUR.
[28] Adam Doupé,et al. Checking Intent-based Communication in Android with Intent Space Analysis , 2016, AsiaCCS.
[29] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[30] Jacques Klein,et al. Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis , 2016, POPL.
[31] Yulong Zhang,et al. Towards Discovering and Understanding Task Hijacking in Android , 2015, USENIX Security Symposium.
[32] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[33] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[34] Naren Ramakrishnan,et al. Causality reasoning about network events for detecting stealthy malware activities , 2016, Comput. Secur..
[35] Alireza Sadeghi,et al. COVERT: Compositional Analysis of Android Inter-App Permission Leakage , 2015, IEEE Transactions on Software Engineering.
[36] Jacques Klein,et al. Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .
[37] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[38] Karim O. Elish,et al. On the Need of Precise Inter-App ICC Classification for Detecting Android , 2015 .
[39] Srdjan Capkun,et al. Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems , 2010 .