ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing
暂无分享,去创建一个
[1] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[2] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[3] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[4] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[5] Eric Smith. iPhone Applications & Privacy Issues: An Analysis of Application Transmission of iPhone Unique Device Identifiers (UDIDs) , 2010 .
[6] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[7] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[8] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[9] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[10] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[11] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[12] Wendy E. Mackay,et al. Patterns of sharing customizable software , 1990, CSCW '90.
[13] Johannes Schöning,et al. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage , 2011, Mobile HCI.
[14] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[15] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[16] Yajin Zhou,et al. Android Malware , 2013, SpringerBriefs in Computer Science.
[17] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[18] Avik Chaudhuri,et al. Language-based security on Android , 2009, PLAS '09.
[19] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[20] Mihir Bellare,et al. Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..
[21] L. Connors,et al. The Washington Post , 2003 .
[22] Todd Millstein,et al. Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android , 2011 .