Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating
暂无分享,去创建一个
XiaoFeng Wang | Rui Wang | Luyi Xing | Kan Yuan | Xiaorui Pan | Xiaofeng Wang | Rui Wang | Luyi Xing | Xiaorui Pan | Kan Yuan
[1] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[2] Helen J. Wang,et al. ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Edgar R. Weippl,et al. Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications , 2012, NDSS.
[4] Chris Hawblitzel,et al. Safe to the last instruction: automated verification of a type-safe operating system , 2010, PLDI '10.
[5] Rui Wang,et al. Unauthorized origin crossing on mobile platforms: threats and mitigation , 2013, CCS.
[6] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[7] Yannis Smaragdakis,et al. Check 'n' crash: combining static checking and testing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[8] Shmuel Sagiv,et al. TVLA: A System for Implementing Static Analyses , 2000, SAS.
[9] Dawson R. Engler,et al. Static Analysis versus Software Model Checking for Bug Finding , 2004, VMCAI.
[10] James Sellwood. Sleeping Android : Exploit through Dormant Permission Requests , 2013 .
[11] Byung-Gon Chun,et al. Vision: automated security validation of mobile apps at app markets , 2011, MCS '11.
[12] Sriram K. Rajamani,et al. Thorough static analysis of device drivers , 2006, EuroSys.
[13] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[14] Per Bjesse,et al. Finding Bugs in an Alpha Microprocessor Using Satisfiability Solvers , 2001, CAV.
[15] Frank Piessens,et al. The VeriFast program verifier , 2008 .
[16] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[17] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[18] A. Arora,et al. Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis , 2004 .
[19] Bernhard Beckert,et al. Verification of Object-Oriented Software. The KeY Approach - Foreword by K. Rustan M. Leino , 2007, The KeY Approach.
[20] Dawn Song,et al. Malware Detection , 2010, Advances in Information Security.
[21] Michael Howard,et al. Inside the Windows Security Push , 2003, IEEE Secur. Priv..
[22] Bor-Yuh Evan Chang,et al. Boogie: A Modular Reusable Verifier for Object-Oriented Programs , 2005, FMCO.
[23] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[24] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[25] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[26] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[27] Armin Biere,et al. Bounded model checking , 2003, Adv. Comput..
[28] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.