A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control
暂无分享,去创建一个
Feng Liu | Fan Wu | Hui Lu | Yuanan Liu | Wenhao Fan | Ran Sun
[1] Sahin Albayrak,et al. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[2] Dong Hoon Lee,et al. A study on static analysis model of mobile application for privacy protection , 2012, CSA 2012.
[3] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[4] Robert P. Sheridan,et al. Random Forest: A Classification and Regression Tool for Compound Classification and QSAR Modeling , 2003, J. Chem. Inf. Comput. Sci..
[5] M. Chuah,et al. Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[6] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[7] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[8] Ming Fan,et al. DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis , 2017, IEEE Transactions on Information Forensics and Security.
[9] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[10] Johannes Köstler,et al. Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android , 2013, Inf. Secur. Tech. Rep..
[11] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[12] Sunita Dhavale,et al. Overview of information flow tracking techniques based on taint analysis for Android , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).
[13] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[14] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[15] Jacques Klein,et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[16] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.