NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
暂无分享,去创建一个
[1] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[2] Todd D. Millstein,et al. Dr. Android and Mr. Hide: fine-grained permissions in android applications , 2012, SPSM '12.
[3] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[4] Hybrid User-level Sandboxing of Third-party Android Apps , 2015, AsiaCCS.
[5] Eric Bodden,et al. DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[6] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[7] Ahmad-Reza Sadeghi,et al. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.
[8] Gang Tan,et al. NativeGuard: protecting android applications from third-party native libraries , 2014, WiSec '14.
[9] Fernando C. Colón Osorio,et al. “TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[10] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[11] J. Gregory Morrisett,et al. Robusta: taming the native beast of the JVM , 2010, CCS '10.
[12] Giovanni Russello,et al. FireDroid: hardening security in almost-stock Android , 2013, ACSAC.
[13] Shashi Shekhar,et al. AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.
[14] Michael Backes,et al. Boxify: Full-fledged App Sandboxing for Stock Android , 2015, USENIX Security Symposium.
[15] Michael Backes,et al. AppGuard - Enforcing User Requirements on Android Apps , 2013, TACAS.
[16] Yuewu Wang,et al. DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices , 2015, NDSS.
[17] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[18] Xiao Zhang,et al. AFrame: isolating advertisements from mobile applications in Android , 2013, ACSAC.
[19] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[20] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.