Visual Configuration of Mobile Privacy Policies
暂无分享,去创建一个
[1] William Enck,et al. Preventing accidental data disclosure in modern operating systems , 2013, CCS.
[2] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[3] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[4] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[6] Kang G. Shin,et al. Location Privacy Protection for Smartphone Users , 2014, CCS.
[7] Hao Chen,et al. Investigating User Privacy in Android Ad Libraries , 2012 .
[8] Xue Liu,et al. Effective Real-Time Android Application Auditing , 2015, 2015 IEEE Symposium on Security and Privacy.
[9] Mukul R. Prasad,et al. Automated testing with targeted event sequence generation , 2013, ISSTA.
[10] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[11] Julia Rubin,et al. A Bayesian Approach to Privacy Enforcement in Smartphones , 2014, USENIX Security Symposium.
[12] Christos Faloutsos,et al. Why people hate your app: making sense of user feedback in a mobile app store , 2013, KDD.
[13] Irina Shklovski,et al. Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.
[14] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[15] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[16] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[17] Ahmed E. Hassan,et al. What Do Mobile App Users Complain About? , 2015, IEEE Software.
[18] Pietro Ferrara,et al. MorphDroid: Fine-grained Privacy Verification , 2015, ACSAC.
[19] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[20] Klara Nahrstedt,et al. Identity, location, disease and more: inferring your secrets from android public resources , 2013, CCS.
[21] Norman M. Sadeh,et al. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.
[22] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[23] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[24] Seungyeop Han,et al. Short paper: enhancing mobile application permissions with runtime feedback and constraints , 2012, SPSM '12.
[25] George C. Necula,et al. Guided GUI testing of android apps with minimal restart and approximate learning , 2013, OOPSLA.
[26] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[27] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[28] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[29] Johannes Köstler,et al. Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android , 2013, Inf. Secur. Tech. Rep..