Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android
暂无分享,去创建一个
Carl A. Gunter | Soteris Demetriou | XiaoFeng Wang | Xiao-yong Zhou | Muhammad Naveed | Xiaofeng Wang | Xiao-yong Zhou | Muhammad Naveed | Soteris Demetriou
[1] Niraj K. Jha,et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[2] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[3] Patrick D. McDaniel,et al. Semantically rich application-centric security in Android , 2012 .
[4] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[5] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[6] Mahmudur Rahman,et al. Secure Management of Low Power Fitness Trackers , 2013, IEEE Transactions on Mobile Computing.
[7] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[8] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[9] Ramon Martí,et al. Security specification and implementation for mobile e-health services , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[10] Andrea Bittau,et al. BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.
[11] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[12] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[13] Klara Nahrstedt,et al. Identity, location, disease and more: inferring your secrets from android public resources , 2013, CCS.
[14] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[15] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[16] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[17] Yuval Elovici,et al. Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.
[18] N. Ahuja,et al. The Smartphone in Medicine: A Review of Current and Potential Use Among Physicians and Students , 2012, Journal of medical Internet research.
[19] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[20] Patrick D. McDaniel,et al. Porscha: policy oriented secure content handling in Android , 2010, ACSAC '10.
[21] Marko Helenius,et al. About malicious software in smartphones , 2006, Journal in Computer Virology.
[22] Dennis Kügler,et al. "Man in the Middle" Attacks on Bluetooth , 2003, Financial Cryptography.
[23] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.