IconIntent: Automatic Identification of Sensitive UI Widgets Based on Icon Classification for Android Apps
暂无分享,去创建一个
Peng Gao | Zhihao Cao | Xiaoyin Wang | Xusheng Xiao | Hanlin Wang | Xiaoyin Wang | Xusheng Xiao | Peng Gao | Hanlin Wang | Zhihao Cao
[1] Xiangyu Zhang,et al. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps , 2015, USENIX Security Symposium.
[2] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[3] Garrison W. Cottrell,et al. Color-to-Grayscale: Does the Method Matter in Image Recognition? , 2012, PloS one.
[4] Ramesh Govindan,et al. Medusa: a programming framework for crowd-sensing applications , 2012, MobiSys '12.
[5] Rob Miller,et al. GUI testing using computer vision , 2010, CHI.
[6] Thomas F. Liu,et al. Learning Design Semantics for Mobile Apps , 2018, UIST.
[7] Yao Guo,et al. PERUIM: understanding mobile application privacy with permission-UI mapping , 2016, UbiComp.
[8] Cao Zhihao. Sensitive Text Icon Classification for Android Apps , 2017 .
[9] Atanas Rountev,et al. Static Reference Analysis for GUI Objects in Android Software , 2014, CGO '14.
[10] Tuan Anh Nguyen,et al. Reverse Engineering Mobile Application User Interfaces with REMAUI (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[11] Peter N. Yianilos,et al. Learning String-Edit Distance , 1996, IEEE Trans. Pattern Anal. Mach. Intell..
[12] Grzegorz Kondrak,et al. N-Gram Similarity and Distance , 2005, SPIRE.
[13] Dengfeng Li,et al. UiRef: analysis of sensitive user inputs in Android applications , 2017, WISEC.
[14] Rob Miller,et al. Sikuli: using GUI screenshots for search and automation , 2009, UIST '09.
[15] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[16] Yan Wang,et al. Static Window Transition Graphs for Android (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[17] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[18] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[19] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[20] Hiromitsu Yamada,et al. Optical Character Recognition , 1999 .
[21] Alessandro Orso,et al. X-PERT: a web application testing tool for cross-browser inconsistency detection , 2014, ISSTA 2014.
[22] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[23] Xue Qin,et al. GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[24] Tom Drummond,et al. Faster and Better: A Machine Learning Approach to Corner Detection , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Alessandro Orso,et al. WEBDIFF: Automated identification of cross-browser issues in web applications , 2010, 2010 IEEE International Conference on Software Maintenance.
[26] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[27] Zhuoqing Morley Mao,et al. AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users , 2013, CODASPY.
[28] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[29] Yan Wang,et al. Static Control-Flow Analysis of User-Driven Callbacks in Android Applications , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[30] Xiaofeng Wang,et al. UIPicker: User-Input Privacy Identification in Mobile Applications , 2015, USENIX Security Symposium.
[31] Jeffrey M. Voas,et al. BYOD: Security and Privacy Considerations , 2012, IT Professional.
[32] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[33] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[34] Xiangyu Zhang,et al. Detecting sensitive data disclosure via bi-directional text correlation analysis , 2016, SIGSOFT FSE.
[35] Zhong Chen,et al. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.
[36] Ken Turkowski,et al. Filters for common resampling tasks , 1990 .
[37] Robert J. Schalkoff,et al. Digital Image Processing and Computer Vision , 1989 .
[38] Peng Wang,et al. AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction , 2014, ICSE.