Android security framework: extensible multi-layered access control on Android
暂无分享,去创建一个
[1] Mike Hibler,et al. The Flask Security Architecture: System Support for Diverse Security Policies , 1999, USENIX Security Symposium.
[2] Patrick McDaniel,et al. Existing Applications Interactions in Android Semantically Rich Application-Centric Security in Android , 2009 .
[3] Timothy Fraser,et al. LOMAC: MAC You Can Live With , 2001, USENIX Annual Technical Conference, FREENIX Track.
[4] Ahmad-Reza Sadeghi,et al. ASM: A Programmable Interface for Extending Android Security , 2014, USENIX Security Symposium.
[5] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Patrick D. McDaniel,et al. Semantically rich application-centric security in Android , 2012 .
[7] Shashi Shekhar,et al. AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.
[8] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[9] Daniel F. Sterne,et al. Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[10] Chris Vance,et al. The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 , 2003, USENIX Annual Technical Conference, FREENIX Track.
[11] Todd D. Millstein,et al. Dr. Android and Mr. Hide: fine-grained permissions in android applications , 2012, SPSM '12.
[12] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[13] Trent Jaeger,et al. Dynamic mandatory access control for multiple stakeholders , 2009, SACMAT '09.
[14] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[15] Michael Backes,et al. Android Security Framework: Enabling Generic and Extensible Access Control on Android , 2014, ArXiv.
[16] Atul Prakash,et al. Methods and limitations of security policy reconciliation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[17] Timothy Fraser,et al. Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[18] Somesh Jha,et al. Automatic placement of authorization hooks in the linux security modules framework , 2005, CCS '05.
[19] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[20] Crispin Cowan,et al. Linux Security Module Framework , 2002 .
[21] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[22] David F. Ferraiolo,et al. On the formal definition of separation-of-duty policies and their composition , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[23] Wenliang Du,et al. Compac: enforce component-level access control in android , 2014, CODASPY '14.
[24] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .
[25] Michael Backes,et al. AppGuard - Enforcing User Requirements on Android Apps , 2013, TACAS.
[26] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.
[27] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[28] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[29] Trent Jaeger,et al. Runtime verification of authorization hook placement for the linux security modules framework , 2002, CCS '02.
[30] Xuxian Jiang,et al. Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.
[31] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[32] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[33] Ahmad-Reza Sadeghi,et al. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.
[34] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[35] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[36] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[37] Todd Millstein,et al. Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android , 2011 .
[38] Mauro Conti,et al. MOSES: supporting operation modes on smartphones , 2012, SACMAT '12.
[39] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[40] Ahmad-Reza Sadeghi,et al. Practical and lightweight domain isolation on Android , 2011, SPSM '11.
[41] Dixie B. Baker,et al. Fortresses built upon sand , 1996, NSPW '96.
[42] Theodore A. Linden. Operating System Structures to Support Security and Reliable Software , 1976, CSUR.