Improving mobile application security via bridging user expectations and application behaviors
暂无分享,去创建一个
[1] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[2] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[3] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[4] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[5] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[6] Tao Xie,et al. Automated extraction of security policies from natural-language software documents , 2012, SIGSOFT FSE.
[7] Tao Xie,et al. Inferring method specifications from natural language API descriptions , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[8] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[9] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[10] Nikolai Tillmann,et al. User-aware privacy control via extended static-information-flow analysis , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[11] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[12] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[13] Tao Xie,et al. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[14] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.