Permission based Android security: Issues and countermeasures
暂无分享,去创建一个
Yingjiu Li | Weili Han | Zheran Fang | Yingjiu Li | Weili Han | Zheran Fang
[1] Ninghui Li,et al. Android permissions: a perspective combining risks and benefits , 2012, SACMAT '12.
[2] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[3] Todd D. Millstein,et al. Dr. Android and Mr. Hide: fine-grained permissions in android applications , 2012, SPSM '12.
[4] Weili Han,et al. Role mining algorithm evaluation and improvement in large volume android applications , 2013, SESP '13.
[5] Dawn Xiaodong Song,et al. Contextual Policy Enforcement in Android Applications with Permission Event Graphs , 2013, NDSS.
[6] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[7] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[8] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[9] Sahin Albayrak,et al. Enhancing security of linux-based android devices , 2008 .
[10] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[11] Richard A. Kemmerer,et al. A practical approach to identifying storage and timing channels: twenty years later , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[12] Cecilia Mascolo,et al. Don't kill my ads!: balancing privacy in an ad-supported mobile application market , 2012, HotMobile '12.
[13] Ahmad-Reza Sadeghi,et al. Poster: the quest for security against privilege escalation attacks on android , 2011, CCS '11.
[14] Ahmad-Reza Sadeghi,et al. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.
[15] Yajin Zhou,et al. Android Malware , 2013, SpringerBriefs in Computer Science.
[16] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[17] Toshiaki Tanaka,et al. A Small But Non-negligible Flaw in the Android Permission Scheme , 2010, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks.
[18] Michalis Faloutsos,et al. Permission evolution in the Android ecosystem , 2012, ACSAC '12.
[19] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[20] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[21] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[22] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[23] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[24] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[25] Lujo Bauer,et al. Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract) , 2013, ESORICS.
[26] Zhaohui Wu,et al. Collaborative Policy Administration , 2014, IEEE Transactions on Parallel and Distributed Systems.
[27] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[28] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[29] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[30] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[31] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[32] Lujo Bauer,et al. Modeling and Enhancing Android's Permission System , 2012, ESORICS.
[33] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[34] Ahmad-Reza Sadeghi,et al. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks , 2011 .
[35] William Enck,et al. Mitigating Android Software Misuse Before It Happens , 2008 .
[36] Hubert Ritzdorf,et al. Analysis of the communication between colluding applications on modern smartphones , 2012, ACSAC '12.
[37] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[38] Javier Gozalvez. First Google's android phone launched [Mobile Radio] , 2008, IEEE Vehicular Technology Magazine.
[39] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[40] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[41] David A. Wagner,et al. AdDroid: privilege separation for applications and advertisers in Android , 2012, ASIACCS '12.
[42] Srdjan Capkun,et al. Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems , 2010 .
[43] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[44] Shashi Shekhar,et al. AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.
[45] Weili Han,et al. A survey on policy languages in network and security management , 2012, Comput. Networks.
[46] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.