A11y Attacks: Exploiting Accessibility in Operating Systems
暂无分享,去创建一个
Wenke Lee | Chengyu Song | Simon P. Chung | Tielei Wang | Yeongjin Jang | Wenke Lee | Chengyu Song | Tielei Wang | S. Chung | Yeongjin Jang
[1] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[2] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[3] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[4] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[5] Letresa McLawhorn,et al. Leveling the Accessibility Playing Field: Section 508 of the Rehabilitation Act , 2001 .
[6] Vitaly Shmatikov,et al. Memento: Learning Secrets from Process Footprints , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[8] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[9] Kirstie Hawkey,et al. Do windows users follow the principle of least privilege?: investigating user account control practices , 2010, SOUPS.
[10] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[11] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[12] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[13] Yajin Zhou,et al. The impact of vendor customizations on android security , 2013, CCS.
[14] Wenke Lee,et al. Jekyll on iOS: When Benign Apps Become Evil , 2013, USENIX Security Symposium.
[15] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[16] Fan Zhang,et al. Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.
[17] G. Broll,et al. Microsoft Corporation , 1999 .
[18] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[19] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[20] Yajin Zhou,et al. Detecting Passive Content Leaks and Pollution in Android Applications , 2013, NDSS.