Blender: Self-randomizing Address Space Layout for Android Apps
暂无分享,去创建一个
[1] Kevin Barraclough,et al. I and i , 2001, BMJ : British Medical Journal.
[2] John C. S. Lui,et al. DroidEagle: seamless detection of visually similar Android apps , 2015, WISEC.
[3] William K. Robertson,et al. PatchDroid: scalable third-party security patches for Android devices , 2013, ACSAC.
[4] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[5] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[6] Nicolas Christin,et al. All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.
[7] Yulong Zhang,et al. Towards Discovering and Understanding Task Hijacking in Android , 2015, USENIX Security Symposium.
[8] Úlfar Erlingsson,et al. Low-Level Software Security: Attacks and Defenses , 2007, FOSAD.
[9] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Cristiano Giuffrida,et al. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization , 2012, USENIX Security Symposium.
[11] John C. S. Lui,et al. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Christopher Krügel,et al. What the App is That? Deception and Countermeasures in the Android User Interface , 2015, 2015 IEEE Symposium on Security and Privacy.
[13] Zhuoqing Morley Mao,et al. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks , 2014, USENIX Security Symposium.
[14] Lorenzo Martignoni,et al. Surgically Returning to Randomized lib(c) , 2009, 2009 Annual Computer Security Applications Conference.
[15] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[16] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[17] Christopher Krügel,et al. Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy , 2016, NDSS.
[18] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[19] Wenke Lee,et al. From Zygote to Morula: Fortifying Weakened ASLR on Android , 2014, 2014 IEEE Symposium on Security and Privacy.
[20] Bi Wu,et al. SpanDex: Secure Password Tracking for Android , 2014, USENIX Security Symposium.
[21] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[22] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[23] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[24] Hybrid User-level Sandboxing of Third-party Android Apps , 2015, AsiaCCS.
[25] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[26] John C. S. Lui,et al. DroidRay: a security evaluation system for customized android firmwares , 2014, AsiaCCS.
[27] Xuxian Jiang,et al. Design and implementation of an Android host-based intrusion prevention system , 2014, ACSAC.
[28] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[29] Yue Chen,et al. Remix: On-demand Live Randomization , 2016, CODASPY.
[30] Per Larsen,et al. Leakage-Resilient Layout Randomization for Mobile Devices , 2016, NDSS.
[31] R. Sekar,et al. Eternal War in Memory , 2014, IEEE Security & Privacy.
[32] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[33] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[34] Alastair R. Beresford,et al. Security Metrics for the Android Ecosystem , 2015, SPSM@CCS.
[35] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[36] Dan Boneh,et al. Address space randomization for mobile devices , 2011, WiSec '11.
[37] Or Peles,et al. One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android , 2015, WOOT.
[38] Dionysus Blazakis. Interpreter Exploitation , 2010, WOOT.
[39] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[40] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[41] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[42] Kevin W. Hamlen,et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code , 2012, CCS.