*droid
暂无分享,去创建一个
Patrick Traynor | William Enck | Kevin R. B. Butler | Bradley Reaves | Jasmine Bowers | Sigmund Albert Gorski | Olabode Anise | Rahul Bobhate | Raymond Cho | Hiranava Das | Sharique Hussain | Hamza Karachiwala | Nolen Scaife | Byron Wright | Patrick Traynor | Bradley Reaves | Nolen Scaife | Jasmine Bowers | Olabode Anise | Rahul Bobhate | Raymond Cho | Hiranava Das | S. Hussain | Hamza Karachiwala | Byron Wright | W. Enck
[1] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[2] Yves Le Traon,et al. Automatically securing permission-based software by reducing the attack surface: an application to Android , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[3] Jason Nieh,et al. A measurement study of google play , 2014, SIGMETRICS '14.
[4] Isil Dillig,et al. Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.
[5] Matthew Might,et al. Sound and precise malware analysis for android via pushdown reachability and entry-point saturation , 2013, SPSM '13.
[6] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[7] Somesh Jha,et al. Retargeting Android applications to Java bytecode , 2012, SIGSOFT FSE.
[8] Alessandra Gorla,et al. Automated Test Input Generation for Android: Are We There Yet? (E) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[9] Suman Nath,et al. PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps , 2014, MobiSys.
[10] Tilo Müller,et al. Divide-and-Conquer: Why Android Malware Cannot Be Stopped , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[11] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[12] Vitaly Shmatikov,et al. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks , 2014, NDSS.
[13] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[14] Eric Bodden,et al. Inter-procedural data-flow analysis with IFDS/IDE and Soot , 2012, SOAP '12.
[15] Nikolai Tillmann,et al. User-aware privacy control via extended static-information-flow analysis , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[16] Yannis Smaragdakis,et al. Introspective analysis: context-sensitivity, across the board , 2014, PLDI.
[17] John C. S. Lui,et al. DroidEagle: seamless detection of visually similar Android apps , 2015, WISEC.
[18] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[19] Kai Chen,et al. From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App , 2015, CCS.
[20] Suman Nath,et al. Brahmastra: Driving Apps to Test the Security of Third-Party Components , 2014, USENIX Security Symposium.
[21] Barbara G. Ryder,et al. User-Centric Dependence Analysis For Identifying Malicious Mobile Apps , 2012 .
[22] Peng Wang,et al. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale , 2015, USENIX Security Symposium.
[23] William Enck,et al. PREC: practical root exploit containment for android devices , 2014, CODASPY '14.
[24] Zheng Wei,et al. LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes , 2014, SPSM@CCS.
[25] Shashi Shekhar,et al. AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.
[26] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[27] Jeff H. Perkins,et al. Information Flow Analysis of Android Applications in DroidSafe , 2015, NDSS.
[28] Rohan Padhye,et al. Interprocedural data flow analysis in Soot using value contexts , 2013, SOAP '13.
[29] Ondrej Lhoták,et al. The Soot framework for Java program analysis: a retrospective , 2011 .
[30] Yajin Zhou,et al. The impact of vendor customizations on android security , 2013, CCS.
[31] Zhuoqing Morley Mao,et al. AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users , 2013, CODASPY.
[32] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[33] Ondrej Lhoták,et al. Scaling Java Points-to Analysis Using SPARK , 2003, CC.
[34] Nicholas Nethercote,et al. Dynamic Binary Analysis and Instrumentation , 2004 .
[35] Vrizlynn L. L. Thing,et al. Securing Android , 2015, ACM Comput. Surv..
[36] Xuxian Jiang,et al. Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.
[37] Benjamin Livshits,et al. Reflection Analysis for Java , 2005, APLAS.
[38] Vincent Roca,et al. Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission , 2014, WiSec '14.
[39] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[40] Christopher Krügel,et al. TriggerScope: Towards Detecting Logic Bombs in Android Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[41] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[42] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.
[43] Lukasz Ziarek,et al. Information flows as a permission mechanism , 2014, ASE.
[44] Nicolas Christin,et al. Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.
[45] Sencun Zhu,et al. ViewDroid: towards obfuscation-resilient mobile application repackaging detection , 2014, WiSec '14.
[46] Peng Wang,et al. AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction , 2014, ICSE.
[47] David Grove,et al. Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis , 1995, ECOOP.
[48] Ondrej Lhoták,et al. In defense of soundiness , 2015, Commun. ACM.
[49] Sam Malek,et al. EvoDroid: segmented evolutionary testing of Android apps , 2014, SIGSOFT FSE.
[50] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[51] Xiaofeng Wang,et al. UIPicker: User-Input Privacy Identification in Mobile Applications , 2015, USENIX Security Symposium.
[52] Christopher Krügel,et al. What the App is That? Deception and Countermeasures in the Android User Interface , 2015, 2015 IEEE Symposium on Security and Privacy.
[53] Todd D. Millstein,et al. RERAN: Timing- and touch-sensitive record and replay for Android , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[54] Laurie Hendren,et al. Soot: a Java bytecode optimization framework , 2010, CASCON.
[55] Porfirio Tramontana,et al. Using GUI ripping for automated testing of Android applications , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[56] Yannis Smaragdakis,et al. More Sound Static Handling of Java Reflection , 2015, APLAS.
[57] Ondrej Lhoták,et al. Pick your contexts well: understanding object-sensitivity , 2011, POPL '11.
[58] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[59] Xin Chen,et al. DroidJust: automated functionality-aware privacy leakage analysis for Android applications , 2015, WISEC.
[60] Christopher Krügel,et al. BareDroid: Large-Scale Analysis of Android Apps on Real Devices , 2015, ACSAC 2015.
[61] Nikolai Tillmann,et al. User-aware privacy control via extended static-information-flow analysis , 2012, ASE.
[62] Mu Zhang,et al. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications , 2014, NDSS.
[63] Christopher Krügel,et al. CLAPP: characterizing loops in Android applications , 2015, ESEC/SIGSOFT FSE.
[64] Xingmin Cui,et al. WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps , 2015, WISEC.
[65] K. Yi,et al. Static Analyzer for Detecting Privacy Leaks in Android Applications , 2012 .
[66] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[67] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[68] Matthew Smith,et al. SoK: Lessons Learned from Android Security Research for Appified Software Platforms , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[69] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[70] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[71] Thomas W. Reps,et al. Precise interprocedural dataflow analysis via graph reachability , 1995, POPL '95.
[72] Daniele Gallingani,et al. Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications , 2015 .
[73] Wenke Lee,et al. Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting , 2015, NDSS.
[74] Patrick Traynor,et al. Mo(bile) Money, Mo(bile) Problems , 2017, ACM Trans. Priv. Secur..
[75] Thomas W. Reps,et al. Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation , 1995, TAPSOFT.
[76] Jacques Klein,et al. Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot , 2012, SOAP '12.
[77] Jacques Klein,et al. Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .
[78] Eric Bodden,et al. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques , 2016, NDSS.
[79] Ryan Stevens,et al. MAdFraud: investigating ad fraud in android applications , 2014, MobiSys.
[80] David Brumley,et al. An empirical study of cryptographic misuse in android applications , 2013, CCS.
[81] Guevara Noubir,et al. Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning , 2014, WiSec '14.
[82] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[83] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[84] 共立出版株式会社. コンピュータ・サイエンス : ACM computing surveys , 1978 .
[85] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[86] Hao Chen,et al. RetroSkeleton: retrofitting android apps , 2013, MobiSys '13.
[87] Bernd Freisleben,et al. Why eve and mallory love android: an analysis of android SSL (in)security , 2012, CCS.
[88] Ranveer Chandra,et al. Caiipa: automated large-scale mobile app testing through contextual fuzzing , 2014, MobiCom.
[89] Martin C. Rinard,et al. Analysis of Multithreaded Programs , 2001, SAS.
[90] Xue Liu,et al. Effective Real-Time Android Application Auditing , 2015, 2015 IEEE Symposium on Security and Privacy.
[91] Lujo Bauer,et al. Android taint flow analysis for app sets , 2014, SOAP '14.
[92] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[93] Xiangyu Zhang,et al. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps , 2015, USENIX Security Symposium.
[94] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[95] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.