Detecting injected behaviors in HTML5-based Android applications
暂无分享,去创建一个
[1] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[2] Vitaly Shmatikov,et al. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks , 2014, NDSS.
[3] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[4] Wenliang Du,et al. Fine-Grained Access Control for HTML5-Based Mobile Applications in Android , 2013, ISC.
[5] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[6] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[7] Hongseok Yang,et al. Automated concolic testing of smartphone apps , 2012, SIGSOFT FSE.
[8] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[9] Ahmad-Reza Sadeghi,et al. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .
[10] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[11] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[12] Alessandro Armando,et al. An Empirical Evaluation of the Android Security Framework , 2013, SEC.
[13] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[14] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[15] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[16] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[17] Giuseppe Cattaneo,et al. A Novel Anti-forensics Technique for the Android OS , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[18] David Wetherall,et al. Privacy oracle: a system for finding application leaks with black box differential testing , 2008, CCS.
[19] Giuseppe Cattaneo,et al. On the Construction of a False Digital Alibi on the Android OS , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[20] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[21] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[22] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[23] Nan Zhang,et al. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android , 2015, 2015 IEEE Symposium on Security and Privacy.
[24] Heng Yin,et al. Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation , 2014, CCS.
[25] Alfredo De Santis,et al. Multimedia-based battery drain attacks for Android devices , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[26] Alfredo De Santis,et al. Do You Trust Your Phone? , 2009, EC-Web.