Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android
暂无分享,去创建一个
Todd Millstein | Jeffrey S. Foster | Yixin Zhu | Jeffrey A. Vaughan | Jinseong Jeon | Kristopher K. Micinski | Nikhilesh Reddy | J. Foster | T. Millstein | Yixin Zhu | J. A. Vaughan | Jinseong Jeon | N. Reddy
[1] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[2] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[3] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[4] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[5] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[6] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[7] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[8] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[9] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[10] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[11] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[12] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[13] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.