Detecting repackaged smartphone applications in third-party android marketplaces
暂无分享,去创建一个
Yajin Zhou | Xuxian Jiang | Peng Ning | Wu Zhou | P. Ning | Yajin Zhou | Xuxian Jiang | Wu Zhou
[1] Jesse D. Kornblum. Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..
[2] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[3] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[4] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[5] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[6] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[7] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[8] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[9] J. W. Hunt,et al. An Algorithm for Differential File Comparison , 2008 .
[10] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[11] William Enck,et al. Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems , 2012 .
[12] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[13] Christian S. Collberg,et al. K-gram based software birthmarks , 2005, SAC '05.
[14] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[15] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[16] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[17] Daniel Shawcross Wilkerson,et al. Winnowing: local algorithms for document fingerprinting , 2003, SIGMOD '03.
[18] Sencun Zhu,et al. SigFree: A Signature-Free Buffer Overflow Attack Blocker , 2010, IEEE Transactions on Dependable and Secure Computing.
[19] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[20] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[21] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[22] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[23] D. Hurlbut. Fuzzy Hashing for Digital Forensic Investigators , 2009 .
[24] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.