AppIntent: analyzing sensitive data transmission in android for privacy leakage detection
暂无分享,去创建一个
Yuan Zhang | Peng Ning | Guofei Gu | Xiaoyang Sean Wang | Zhemin Yang | Min Yang | Yuan Zhang | P. Ning | G. Gu | X. Wang | Zhemin Yang | Min Yang
[1] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[2] Dawn Xiaodong Song,et al. Contextual Policy Enforcement in Android Applications with Permission Event Graphs , 2013, NDSS.
[3] Xuxian Jiang,et al. Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.
[4] Patrice Godefroid,et al. Compositional dynamic test generation , 2007, POPL '07.
[5] Hongseok Yang,et al. Automated concolic testing of smartphone apps , 2012, SIGSOFT FSE.
[6] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Guofei Gu,et al. SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications , 2012, SPSM '12.
[8] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[9] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[10] Nikolai Tillmann,et al. Fitness-guided path exploration in dynamic symbolic execution , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[11] Dawson R. Engler,et al. RWset: Attacking Path Explosion in Constraint-Based Test Generation , 2008, TACAS.
[12] Byung-Gon Chun,et al. Vision: automated security validation of mobile apps at app markets , 2011, MCS '11.
[13] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[14] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[15] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[16] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[17] Jacques Klein,et al. Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot , 2012, SOAP '12.
[18] Sarfraz Khurshid,et al. Test generation for graphical user interfaces based on symbolic execution , 2008, AST '08.
[19] V. N. Venkatakrishnan,et al. WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction , 2011, CCS '11.
[20] Sarfraz Khurshid,et al. Event Listener Analysis and Symbolic Execution for Testing GUI Applications , 2009, ICFEM.
[21] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[22] Steve Hanna,et al. A Symbolic Execution Framework for JavaScript , 2010, 2010 IEEE Symposium on Security and Privacy.
[23] Vinod Yegneswaran,et al. BLADE: an attack-agnostic approach for preventing drive-by malware infections , 2010, CCS '10.
[24] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[25] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[26] Dawn Xiaodong Song,et al. MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery , 2011, USENIX Security Symposium.
[27] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[28] Raúl A. Santelices,et al. Exploiting program dependencies for scalable multiple-path symbolic execution , 2010, ISSTA '10.
[29] Corina S. Pasareanu,et al. JPF-SE: A Symbolic Execution Extension to Java PathFinder , 2007, TACAS.
[30] Michael Hicks,et al. Directed Symbolic Execution , 2011, SAS.
[31] Stephen McCamant,et al. Statically-directed dynamic automated test generation , 2011, ISSTA '11.
[32] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[33] Manuel Costa,et al. Bouncer: securing software by blocking bad input , 2008, WRAITS '08.
[34] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[35] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[36] Dawson R. Engler,et al. EXE: Automatically Generating Inputs of Death , 2008, TSEC.
[37] Willem Visser,et al. Efficient Testing of Concurrent Programs with Abstraction-Guided Symbolic Execution , 2009, SPIN.
[38] Manu Sridharan,et al. TAJ: effective taint analysis of web applications , 2009, PLDI '09.