NativeGuard: protecting android applications from third-party native libraries
暂无分享,去创建一个
[1] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[2] J. Gregory Morrisett,et al. Robusta: taming the native beast of the JVM , 2010, CCS '10.
[3] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[4] Nicolas Christin,et al. Sweetening android lemon markets: measuring and combating malware in application marketplaces , 2013, CODASPY '13.
[5] Steven D. Gribble,et al. A safety-oriented platform for Web applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[7] Robert Grimm,et al. Jinn: synthesizing dynamic bug detectors for foreign language interfaces , 2010, PLDI '10.
[8] Shashi Shekhar,et al. AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.
[9] Xuxian Jiang,et al. AppInk: watermarking android apps for repackaging deterrence , 2013, ASIA CCS '13.
[10] Gang Tan,et al. JVM-Portable Sandboxing of Java's Native Libraries , 2012, ESORICS.
[11] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[12] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[13] Brian N. Bershad,et al. Recovering device drivers , 2004, TOCS.
[14] Christopher Krügel,et al. Extending .NET Security to Unmanaged Code , 2006, ISC.
[15] David A. Wagner,et al. Joe-E: A Security-Oriented Subset of Java , 2010, NDSS.
[16] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[17] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[18] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[19] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[20] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[21] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[22] Xiao Zhang,et al. AFrame: isolating advertisements from mobile applications in Android , 2013, ACSAC.
[23] Louis-Julien Guillemette. A type-preserving compiler from system f to typed assembly language , 2009 .
[24] Jon Howell,et al. Leveraging Legacy Code to Deploy Desktop Applications on the Web , 2008, OSDI.
[25] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[26] Dirk Westhoff,et al. QuantDroid: Quantitative approach towards mitigating privilege escalation on Android , 2013, 2013 IEEE International Conference on Communications (ICC).
[27] David A. Wagner,et al. Fine-grained privilege separation for web applications , 2010, WWW '10.
[28] David A. Wagner,et al. AdDroid: privilege separation for applications and advertisers in Android , 2012, ASIACCS '12.
[29] Zhenkai Liang,et al. Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions , 2012, ESORICS.
[30] Sheng Liang,et al. Java Native Interface: Programmer's Guide and Reference , 1999 .