Resource Race Attacks on Android
暂无分享,去创建一个
Xiapu Luo | Hao Zhou | Yan Cai | Yutian Tang | Haicheng Li | Le Yu | Liang He | Purui Su
[1] Christopher Krügel,et al. What the App is That? Deception and Countermeasures in the Android User Interface , 2015, 2015 IEEE Symposium on Security and Privacy.
[2] Arindam Ghosh,et al. Recognizing Human Activities from Smartphone Sensor Signals , 2014, ACM Multimedia.
[3] Jacques Klein,et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[4] Yanick Fratantonio,et al. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Sebastian Lekies,et al. Tamper-Resistant LikeJacking Protection , 2013, RAID.
[6] Yajin Zhou,et al. Detecting Passive Content Leaks and Pollution in Android Applications , 2013, NDSS.
[7] Bin Liang,et al. Detecting concurrency memory corruption vulnerabilities , 2019, ESEC/SIGSOFT FSE.
[8] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[9] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[10] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] Laurie Hendren,et al. Soot: a Java bytecode optimization framework , 2010, CASCON.
[13] Hao Chen,et al. Quantifying the Effects of Removing Permissions from Android Applications , 2013 .
[14] Zhuoqing Morley Mao,et al. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks , 2014, USENIX Security Symposium.
[15] Jörg Schwenk,et al. UI Redressing Attacks on Android Devices , 2012 .
[16] Helen J. Wang,et al. Clickjacking: Attacks and Defenses , 2012, USENIX Security Symposium.
[17] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[18] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[19] Dawn Xiaodong Song,et al. Clickjacking Revisited: A Perceptual View of UI Security , 2014, WOOT.
[20] Ronny Hänsch,et al. Security Impact of High Resolution Smartphone Cameras , 2014, WOOT.
[21] David J. Crandall,et al. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones , 2012, NDSS.
[22] Klara Nahrstedt,et al. Identity, location, disease and more: inferring your secrets from android public resources , 2013, CCS.
[23] Jian Lu,et al. GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications , 2014, IEEE Transactions on Software Engineering.
[24] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[25] William K. Robertson,et al. TrueClick: automatically distinguishing trick banners from genuine download links , 2014, ACSAC '14.
[26] Tadayoshi Kohno,et al. Securing Embedded User Interfaces: Android and Beyond , 2013, USENIX Security Symposium.
[27] Milos Prvulovic,et al. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.
[28] Jun Yan,et al. Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps , 2016, IEEE Transactions on Software Engineering.
[29] Koen De Bosschere,et al. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[30] Sebastian Lekies,et al. On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes , 2012, WOOT.
[31] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[32] Yulong Zhang,et al. Towards Discovering and Understanding Task Hijacking in Android , 2015, USENIX Security Symposium.
[33] Shi-Min Hu,et al. Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment , 2017, USENIX Security Symposium.
[34] Ross J. Anderson,et al. PIN skimmer: inferring PINs through the camera and microphone , 2013, SPSM '13.
[35] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[36] Helen J. Wang,et al. A Systematic Approach to Uncover Security Flaws in GUI Logic , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[37] Zachary Weinberg,et al. I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks , 2011, 2011 IEEE Symposium on Security and Privacy.
[38] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[39] Stefan Mangard,et al. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices , 2016, IEEE Communications Surveys & Tutorials.
[40] Per Ola Kristensson,et al. VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input , 2015, CHI.
[41] Michael Burrows,et al. Eraser: a dynamic data race detector for multithreaded programs , 1997, TOCS.
[42] Jun Yan,et al. Characterizing and detecting resource leaks in Android applications , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[43] Nikita Borisov,et al. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses , 2016, NDSS.
[44] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.