Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications
暂无分享,去创建一个
Edgar R. Weippl | Peter Frühwirt | Peter Kieseberg | Manuel Leithner | Sebastian Schrittwieser | Markus Huber | Martin Mulazzani | E. Weippl | Peter Kieseberg | S. Schrittwieser | Markus Huber | M. Mulazzani | Manuel Leithner | P. Frühwirt
[1] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[2] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[3] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[4] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[5] Nick Feamster,et al. Dos and don'ts of client authentication on the web , 2001 .
[6] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[7] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[8] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[9] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[10] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[11] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[12] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[13] Christopher Krügel,et al. Abusing Social Networks for Automated User Profiling , 2010, RAID.
[14] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.