In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments
暂无分享,去创建一个
Yves Le Traon | Alexandre Bartel | Martin Monperrus | Jacques Klein | Kevin Allix | Monperrus Martin | Alexandre Bartel | Jacques Klein | Kevin Allix
[1] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[2] David A. Wagner,et al. AdDroid: privilege separation for applications and advertisers in Android , 2012, ASIACCS '12.
[3] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[4] Ondrej Lhoták,et al. The Soot framework for Java program analysis: a retrospective , 2011 .
[5] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[6] Michael Backes,et al. AppGuard — Real-time policy en- forcement for third-party applications , 2012 .
[7] Todd Millstein,et al. Application-centric security policies on unmodified Android , 2011 .
[8] Xuxian Jiang,et al. Unsafe exposure analysis of mobile in-app advertisements , 2012, WISEC '12.
[9] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[10] Christian Schaefer,et al. Runtime monitoring for next generation Java ME platform , 2010, Comput. Secur..
[11] Hao Chen,et al. I-ARM-Droid : A Rewriting Framework for In-App Reference Monitors for Android Applications , 2012 .
[12] Úlfar Erlingsson,et al. The Inlined Reference Monitor Approach to Security Policy Enforcement , 2004 .
[13] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[14] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[15] Michael Backes,et al. Idea: Callee-Site Rewriting of Sealed System Libraries , 2013, ESSoS.
[16] Ming Zhang,et al. Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof , 2012, EuroSys '12.
[17] Jeffrey M. Voas,et al. Building Security into Off-the-Shelf Smartphones , 2012, Computer.
[18] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[19] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[20] Michael Backes,et al. AppGuard - Enforcing User Requirements on Android Apps , 2013, TACAS.
[21] David E. Evans,et al. Flexible policy-directed code safety , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[22] Jacques Klein,et al. Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation , 2012, ArXiv.
[23] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[24] Jacques Klein,et al. Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot , 2012, SOAP '12.
[25] Anna Philippou,et al. Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.
[26] Yves Le Traon,et al. Automatically securing permission-based software by reducing the attack surface: an application to Android , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[27] Shashi Shekhar,et al. AdSplit: Separating Smartphone Advertising from Applications , 2012, USENIX Security Symposium.
[28] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[29] Todd Millstein,et al. Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android , 2011 .
[30] Laurie Hendren,et al. Soot---a java optimization framework , 1999 .