sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps
暂无分享,去创建一个
Muttukrishnan Rajarajan | Vijay Laxmi | Manoj Singh Gaur | Mauro Conti | Jyoti Gajrani | Meenakshi Tripathi | M. Rajarajan | V. Laxmi | M. Gaur | M. Conti | Jyoti Gajrani | Meenakshi Tripathi
[1] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[2] Elaine B. Barker,et al. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[3] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[4] MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities , 2013, STM.
[5] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[6] David Brumley,et al. An empirical study of cryptographic misuse in android applications , 2013, CCS.
[7] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[8] Iulian Neamtiu,et al. Targeted and depth-first exploration for systematic testing of android apps , 2013, OOPSLA.
[9] Thomas Schreck,et al. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques , 2015, International Journal of Information Security.
[10] Guo Tao,et al. Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications , 2014, DASC.
[11] Latifur Khan,et al. SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps , 2014, NDSS.
[12] Mira Mezini,et al. Towards secure integration of cryptographic software , 2015, Onward!.