What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications
暂无分享,去创建一个
[1] Dengguo Feng,et al. Bind your phone number with caution: automated user profiling through address book matching on smartphone , 2013, ASIA CCS '13.
[2] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[3] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[4] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[5] Nick Feamster,et al. Dos and don'ts of client authentication on the web , 2001 .
[6] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[7] Edgar R. Weippl,et al. Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications , 2012, NDSS.
[8] Ioannis Kounelis,et al. The mobileak project: Forensics methodology for mobile application privacy assessment , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[9] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[10] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[11] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[12] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[13] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[14] Mark Zuckerberg. 500 Million Stories , 2010 .