Checking Intent-based Communication in Android with Intent Space Analysis
暂无分享,去创建一个
[1] Or Peles,et al. One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android , 2015, WOOT.
[2] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[3] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[4] Ahmad-Reza Sadeghi,et al. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.
[5] Karim O. Elish,et al. On the Need of Precise Inter-App ICC Classification for Detecting Android , 2015 .
[6] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[7] Ziming Zhao,et al. Morpheus: automatically generating heuristics to detect Android emulators , 2014, ACSAC '14.
[8] Jacques Klein,et al. Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .
[9] David A. Wagner,et al. Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.
[10] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[11] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[12] Jeff H. Perkins,et al. Information Flow Analysis of Android Applications in DroidSafe , 2015, NDSS.
[13] Ahmad-Reza Sadeghi,et al. ASM: A Programmable Interface for Extending Android Security , 2014, USENIX Security Symposium.
[14] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[15] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[16] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[17] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[18] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[19] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[20] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[21] Ahmad-Reza Sadeghi,et al. Practical and lightweight domain isolation on Android , 2011, SPSM '11.
[22] Michael Backes,et al. Android security framework: extensible multi-layered access control on Android , 2014, ACSAC '14.
[23] William Enck,et al. Preventing accidental data disclosure in modern operating systems , 2013, CCS.
[24] Jeremy Clark,et al. Understanding and improving app installation security mechanisms through empirical analysis of android , 2012, SPSM '12.
[25] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[26] Peng Ning,et al. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning , 2015, USENIX Security Symposium.
[27] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[28] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[29] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[30] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[31] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[32] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.