PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices
暂无分享,去创建一个
[1] Marco Gruteser,et al. A Field Study of Run-Time Location Access Disclosures on Android Smartphones , 2014 .
[2] Hao Chen,et al. RetroSkeleton: retrofitting android apps , 2013, MobiSys '13.
[3] Todd D. Millstein,et al. Dr. Android and Mr. Hide: fine-grained permissions in android applications , 2012, SPSM '12.
[4] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[5] Michael D. Ernst,et al. Collaborative Verification of Information Flow for a High-Assurance App Store , 2014, Software Engineering & Management.
[6] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[7] Daniel Zappala,et al. TLS Proxies: Friend or Foe? , 2014, Internet Measurement Conference.
[8] Kang G. Shin,et al. Location Privacy Protection for Smartphone Users , 2014, CCS.
[9] Zhen Huang,et al. Short paper: a look at smartphone permission models , 2011, SPSM '11.
[10] Christopher Krügel,et al. EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework , 2015, NDSS.
[11] Daniel Zappala,et al. POSTER: TLS Proxies: Friend or Foe? , 2014, CCS.
[12] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[13] Suman Nath,et al. PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps , 2014, MobiSys.
[14] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[15] Julia Rubin,et al. A Bayesian Approach to Privacy Enforcement in Smartphones , 2014, USENIX Security Symposium.
[16] Michael Backes,et al. AppGuard - Enforcing User Requirements on Android Apps , 2013, TACAS.
[17] Arnaud Legout,et al. ReCon: Revealing and Controlling Privacy Leaks in Mobile Network Traffic , 2015, ArXiv.
[18] Arnaud Legout,et al. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic , 2015, MobiSys.
[19] Emiliano De Cristofaro,et al. Danger is my middle name: experimenting with SSL vulnerabilities in Android apps , 2015, WISEC.
[20] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[21] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[22] Lorrie Faith Cranor,et al. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.