Permission-based Risk Signals for App Behaviour Characterization in Android Apps
暂无分享,去创建一个
[1] Michalis Faloutsos,et al. Permission evolution in the Android ecosystem , 2012, ACSAC '12.
[2] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[3] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[4] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[5] Yang Wang,et al. Quantitative Security Risk Assessment of Android Permissions and Applications , 2013, DBSec.
[6] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[7] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[8] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[9] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[10] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[11] Xiangliang Zhang,et al. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.
[12] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[13] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[14] Dawn Xiaodong Song,et al. Mining Permission Request Patterns from Android and Facebook Applications , 2012, 2012 IEEE 12th International Conference on Data Mining.
[15] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[16] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[17] Pern Hui Chia,et al. Is this app safe?: a large scale study on application permissions and risk signals , 2012, WWW.
[18] Sankardas Roy,et al. Deep Ground Truth Analysis of Current Android Malware , 2017, DIMVA.
[19] Olga Gadyatskaya,et al. Small Changes, Big Changes: An Updated View on the Android Permission System , 2016, RAID.
[20] Jennifer King,et al. Privacy: is there an app for that? , 2011, SOUPS.
[21] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[22] Ninghui Li,et al. Android permissions: a perspective combining risks and benefits , 2012, SACMAT '12.