Two vulnerabilities in Android OS kernel
暂无分享,去创建一个
[1] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[2] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[3] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[4] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[5] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[6] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[7] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[8] Nicolas Christin,et al. Toward a general collection methodology for Android devices , 2011, Digit. Investig..
[9] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[10] Alessandro Armando,et al. Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) , 2012, SEC.
[11] S. Zielinski,et al. International Court of Justice , 2002, International Organization.
[12] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[13] Yuval Elovici,et al. Google Android: A State-of-the-Art Review of Security Mechanisms , 2009, ArXiv.
[14] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[15] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[16] Ahmad-Reza Sadeghi,et al. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .
[17] Sahin Albayrak,et al. Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.
[18] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[19] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[20] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[21] William Enck,et al. Mitigating Android Software Misuse Before It Happens , 2008 .
[22] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.