DroidProtector: Preventing Capability Leak of Android Applications
暂无分享,去创建一个
Jianwei Liu | Tao Shang | Shaozhen Ye | Qi Lei | Jiyuan Sun
[1] Neil Daswani,et al. Mobile Malware Madness , and How to Cap the Mad Hatters A Preliminary Look at Mitigating Mobile Malware , 2011 .
[2] Jan S. Rellermeyer,et al. An empirical study of the robustness of Inter-component Communication in Android , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[3] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[4] Abdullah Talha Kabakus,et al. APK Auditor: Permission-based Android malware detection system , 2015, Digit. Investig..
[5] Jacques Klein,et al. Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .
[6] Siu-Ming Yiu,et al. DroidChecker: analyzing android applications for capability leak , 2012, WISEC '12.
[7] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[8] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[9] Christian Hammer,et al. Inter-Application Communication Testing of Android Applications Using Intent Fuzzing , 2014 .
[10] Jeff H. Perkins,et al. Information Flow Analysis of Android Applications in DroidSafe , 2015, NDSS.
[11] Constantin F. Aliferis,et al. Towards Principled Feature Selection: Relevancy, Filters and Wrappers , 2003 .
[12] Artem Starostin,et al. A framework for static detection of privacy leaks in android applications , 2012, SAC '12.
[13] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[14] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[15] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[16] Xuxian Jiang,et al. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks , 2014, IEEE Transactions on Information Forensics and Security.
[17] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[18] Mariano Ceccato,et al. Security testing of the communication among Android applications , 2013, 2013 8th International Workshop on Automation of Software Test (AST).
[19] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[20] Jacques Klein,et al. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis , 2013, USENIX Security Symposium.