Smartphone Security
暂无分享,去创建一个
[1] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[2] Lujo Bauer,et al. Android taint flow analysis for app sets , 2014, SOAP '14.
[3] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[4] Hui Ye,et al. DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag , 2013, MoMM '13.
[5] Sid Stamm,et al. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL , 2010 .
[6] Laurie Hendren,et al. Soot: a Java bytecode optimization framework , 2010, CASCON.
[7] Shi-Min Hu,et al. Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS , 2015, CCS.
[8] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[9] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[10] David Brumley,et al. An empirical study of cryptographic misuse in android applications , 2013, CCS.
[11] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[12] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[13] Christopher Soghoian,et al. Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy , 2014 .
[14] Vitaly Shmatikov,et al. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks , 2014, NDSS.
[15] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[16] Ahmad-Reza Sadeghi,et al. PSiOS: bring your own privacy & security to iOS devices , 2013, ASIA CCS '13.
[17] Jacques Klein,et al. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis , 2013, USENIX Security Symposium.