Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
暂无分享,去创建一个
Yuan Zhang | Binyu Zang | Peng Ning | Guofei Gu | Zhemin Yang | Min Yang
[1] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[2] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[3] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[4] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.
[5] Byung-Gon Chun,et al. Vision: automated security validation of mobile apps at app markets , 2011, MCS '11.
[6] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[7] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[8] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[9] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[10] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[11] Michalis Faloutsos,et al. ProfileDroid: multi-layer profiling of android applications , 2012, Mobicom '12.
[12] David A. Wagner,et al. How to Ask for Permission , 2012, HotSec.
[13] Dawn Xiaodong Song,et al. Mining Permission Request Patterns from Android and Facebook Applications , 2012, 2012 IEEE 12th International Conference on Data Mining.
[14] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[15] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[16] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[17] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[18] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[19] Christopher Krügel,et al. Identifying Dormant Functionality in Malware Programs , 2010, 2010 IEEE Symposium on Security and Privacy.
[20] Kapil Singh. Practical Context-Aware Permission Control for Hybrid Mobile Applications , 2013, RAID.
[21] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[22] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[23] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[24] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[25] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[26] Dawn Xiaodong Song,et al. Contextual Policy Enforcement in Android Applications with Permission Event Graphs , 2013, NDSS.
[27] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[28] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[29] Christopher Krügel,et al. A quantitative study of accuracy in system call-based malware detection , 2012, ISSTA 2012.
[30] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[31] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[32] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[33] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[34] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[35] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[36] Sahin Albayrak,et al. Google Android : a comprehensive introduction , 2009 .
[37] Somesh Jha,et al. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors , 2010, 2010 IEEE Symposium on Security and Privacy.
[38] Hossein Rouhani Zeidanloo,et al. Botnet Command and Control Mechanisms , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[39] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[40] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.
[41] Siu-Ming Yiu,et al. DroidChecker: analyzing android applications for capability leak , 2012, WISEC '12.
[42] Tzi-cker Chiueh,et al. A Forced Sampled Execution Approach to Kernel Rootkit Identification , 2007, RAID.
[43] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[44] Zhuoqing Morley Mao,et al. AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users , 2013, CODASPY.
[45] Guofei Gu,et al. Shadow attacks: automatically evading system-call-behavior based malware detection , 2011, Journal in Computer Virology.
[46] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY '13.
[47] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[48] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[49] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[50] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[51] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[52] Christopher Krügel,et al. PeerPress: utilizing enemies' P2P strength against them , 2012, CCS.
[53] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.