iRiS: Vetting Private API Abuse in iOS Applications
暂无分享,去创建一个
Xiangyu Zhang | Dongyan Xu | Brendan Saltaformaggio | Zhui Deng | X. Zhang | Dongyan Xu | Zhui Deng | Brendan Saltaformaggio
[1] Ali Mesbah,et al. Reverse Engineering iOS Mobile Applications , 2012, 2012 19th Working Conference on Reverse Engineering.
[2] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[3] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[4] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[5] Christopher Krügel,et al. Challenges for Dynamic Analysis of iOS Applications , 2011, iNetSeC.
[6] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[7] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[8] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[9] Chris Vance,et al. The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 , 2003, USENIX Annual Technical Conference, FREENIX Track.
[10] Ahmad-Reza Sadeghi,et al. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones , 2012, NDSS.
[11] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[12] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[13] Ahmad-Reza Sadeghi,et al. PSiOS: bring your own privacy & security to iOS devices , 2013, ASIA CCS '13.
[14] Angelos Stavrou,et al. Forced-Path Execution for Android Applications on x86 Platforms , 2013, 2013 IEEE Seventh International Conference on Software Security and Reliability Companion.
[15] Fei Peng,et al. X-Force: Force-Executing Binary Programs for Security Applications , 2014, USENIX Security Symposium.
[16] Robert H. Deng,et al. Launching Generic Attacks on iOS with Approved Third-Party Applications , 2013, ACNS.
[17] Angelos Stavrou,et al. Exposing Security Risks for Commercial Mobile Devices , 2012, MMM-ACNS.
[18] Wenke Lee,et al. Jekyll on iOS: When Benign Apps Become Evil , 2013, USENIX Security Symposium.
[19] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[20] Ahmad-Reza Sadeghi,et al. XiOS: Extended Application Sandboxing on iOS , 2015, AsiaCCS.
[21] Yulong Zhang,et al. Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates , 2015, AsiaCCS.
[22] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[23] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .
[24] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.