Securing the "Bring Your Own Device" Paradigm
暂无分享,去创建一个
Alessandro Armando | Alessio Merlo | Luca Verderame | Gabriele Costa | A. Armando | Gabriele Costa | Luca Verderame | A. Merlo
[1] Henrik Reif Andersen,et al. Partial model checking , 1995, Proceedings of Tenth Annual IEEE Symposium on Logic in Computer Science.
[2] Katsiaryna Naliuka,et al. ConSpec - A Formal Language for Policy Specification , 2008, Electron. Notes Theor. Comput. Sci..
[3] Katsiaryna Naliuka,et al. ConSpec - A formal language for policy specification , 2008, Sci. Comput. Program..
[4] Christian Schaefer,et al. What the heck is this application doing? - A security-by-contract architecture for pervasive services , 2009, Comput. Secur..
[5] Massimo Bartoletti,et al. Securing Java with Local Policies , 2009, J. Object Technol..
[6] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[7] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[8] Alessandro Armando,et al. Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) , 2012, SEC.
[9] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[10] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[11] Alessandro Armando,et al. Bring your own device, securely , 2013, SAC '13.
[12] Wenke Lee,et al. Jekyll on iOS: When Benign Apps Become Evil , 2013, USENIX Security Symposium.