CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices
暂无分享,去创建一个
Long Lu | Kapil Singh | Suwen Zhu | Long Lu | Kapil Singh | Suwen Zhu
[1] Yuewu Wang,et al. DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices , 2015, NDSS.
[2] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[3] Wenliang Du,et al. Compac: enforce component-level access control in android , 2014, CODASPY '14.
[4] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[5] Hao Chen,et al. RetroSkeleton: retrofitting android apps , 2013, MobiSys '13.
[6] Hybrid User-level Sandboxing of Third-party Android Apps , 2015, AsiaCCS.
[7] Ahmad-Reza Sadeghi,et al. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.
[8] Ahmad-Reza Sadeghi,et al. ASM: A Programmable Interface for Extending Android Security , 2014, USENIX Security Symposium.
[9] Gang Tan,et al. NativeGuard: protecting android applications from third-party native libraries , 2014, WiSec '14.
[10] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[11] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[12] Giovanni Russello,et al. FireDroid: hardening security in almost-stock Android , 2013, ACSAC.
[13] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[14] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[15] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[16] Hao Chen,et al. I-ARM-Droid : A Rewriting Framework for In-App Reference Monitors for Android Applications , 2012 .
[17] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[18] Shashi Shekhar,et al. AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.
[19] Zhenkai Liang,et al. AirBag: Boosting Smartphone Resistance to Malware Infection , 2014, NDSS.
[20] Patrick D. McDaniel,et al. Semantically rich application-centric security in Android , 2012 .
[21] David A. Wagner,et al. AdDroid: privilege separation for applications and advertisers in Android , 2012, ASIACCS '12.
[22] Michael Backes,et al. Android security framework: extensible multi-layered access control on Android , 2014, ACSAC '14.
[23] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[24] Todd D. Millstein,et al. Dr. Android and Mr. Hide: fine-grained permissions in android applications , 2012, SPSM '12.