Launching Generic Attacks on iOS with Approved Third-Party Applications
暂无分享,去创建一个
Robert H. Deng | Debin Gao | Yingjiu Li | Jianying Zhou | Feng Bao | Su Mon Kywe | Qiang Yan | Jin Han
[1] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[2] Yuko Murayama,et al. Future Challenges in Security and Privacy for Academia and Industry , 2011 .
[3] Georgios Kambourakis,et al. iSAM: An iPhone Stealth Airborne Malware , 2011, SEC.
[4] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[5] Andre Egners,et al. Hackers in Your Pocket: A Survey of Smartphone Security Across Platforms , 2012 .
[6] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[7] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[8] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[9] Felix C. Freiling,et al. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.
[10] Sarfraz Khurshid,et al. Directed incremental symbolic execution , 2011, PLDI '11.
[11] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[12] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[13] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[14] Robert H. Deng,et al. Comparing Mobile Privacy Protection through Cross-Platform Applications , 2013, NDSS.