Run-Time Enforcement of Information-Flow Properties on Android (CMU-CyLab-12-015)
暂无分享,去创建一个
Lujo Bauer | Limin Jia | Shinsaku Kiyomoto | Yutaka Miyake | Kazuhide Fukushima | Elli Fragkaki | Jassim Aljuraidan | Lujo Bauer | S. Kiyomoto | Limin Jia | Yutaka Miyake | Elli Fragkaki | Kazuhide Fukushima | Jassim Aljuraidan
[1] Lujo Bauer,et al. Modeling and Enhancing Android's Permission System , 2012, ESORICS.
[2] Danfeng Zhang,et al. Language-based control and mitigation of timing channels , 2012, PLDI.
[3] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[4] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[5] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[6] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[7] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[8] Andrei Sabelfeld,et al. Limiting information leakage in event-based communication , 2011, PLAS '11.
[9] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[10] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[11] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[12] Toshiaki Tanaka,et al. A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework , 2010, 2010 IEEE Second International Conference on Social Computing.
[13] Srdjan Capkun,et al. Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems , 2010 .
[14] Benjamin C. Pierce,et al. Reactive noninterference , 2009, CCS.
[15] Avik Chaudhuri,et al. Language-based security on Android , 2009, PLAS '09.
[16] Eran Tromer,et al. Noninterference for a Practical DIFC-Based Operating System , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[17] Peter Y. A. Ryan,et al. Process algebra and non-interference , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.