Paranoid Android: versatile protection for smartphones
暂无分享,去创建一个
Herbert Bos | Georgios Portokalidis | Philip Homburg | Kostas Anagnostakis | H. Bos | K. Anagnostakis | G. Portokalidis | P. Homburg
[1] Herbert Bos,et al. Paranoid Android : Zero-Day Protection for Smartphones Using the Cloud , 2010 .
[2] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[3] Antony I. T. Rowstron,et al. Vigilante: End-to-end containment of Internet worm epidemics , 2006, TOCS.
[4] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[5] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[6] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[7] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[8] Benjamin Livshits,et al. Ripley: automatically securing web 2.0 applications through replicated execution , 2009, CCS.
[9] Peter M. Chen,et al. Execution replay of multiprocessor virtual machines , 2008, VEE '08.
[10] Min Xu,et al. A "flight data recorder" for enabling full-system multiprocessor deterministic replay , 2003, ISCA '03.
[11] Xuezheng Liu,et al. Usenix Association 8th Usenix Symposium on Operating Systems Design and Implementation R2: an Application-level Kernel for Record and Replay , 2022 .
[12] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[13] Koen De Bosschere,et al. RecPlay: a fully integrated practical record/replay system , 1999, TOCS.
[14] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[15] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[16] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[17] Tal Garfinkel,et al. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments , 2008, USENIX Annual Technical Conference.
[18] Ravishankar K. Iyer,et al. Defeating memory corruption attacks via pointer taintedness detection , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[19] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[20] Thomas J. LeBlanc,et al. Debugging Parallel Programs with Instant Replay , 1987, IEEE Transactions on Computers.
[21] Satish Narayanasamy,et al. BugNet: continuously recording program execution for deterministic replay debugging , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[22] Byung-Gon Chun,et al. Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.
[23] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[24] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[25] Michael K. Reiter,et al. Secure execution of Java applets using a remote playground , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[26] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[27] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[28] Josep Torrellas,et al. Capo: a software-hardware interface for practical deterministic multiprocessor replay , 2009, ASPLOS.
[29] Mark Russinovich,et al. Replay for concurrent non-deterministic shared-memory applications , 1996, PLDI '96.
[30] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[31] Les Hatton,et al. Reexamining the Fault Density-Component Size Connection , 1997, IEEE Softw..
[32] Stuart E. Schechter,et al. Milk or Wine: Does Software Security Improve with Age? , 2006, USENIX Security Symposium.
[33] David Lorge Parnas,et al. Concurrent control with “readers” and “writers” , 1971, CACM.