SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
暂无分享,去创建一个
Ninghui Li | Peng Ning | Xun Chen | Ahmed M. Azab | William Enck | Yueqiang Cheng | Wenbo Shen | Ruowen Wang | P. Ning | Ninghui Li | Yueqiang Cheng | Wenbo Shen | W. Enck | Ruowen Wang | Xun Chen
[1] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[2] Phil McMinn,et al. Search‐based software test data generation: a survey , 2004, Softw. Test. Verification Reliab..
[3] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[4] Jean-Pierre Seifert,et al. Usage control platformization via trustworthy SELinux , 2008, ASIACCS '08.
[5] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[6] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[7] Mukul R. Prasad,et al. Automated testing with targeted event sequence generation , 2013, ISSTA.
[8] George C. Necula,et al. Guided GUI testing of android apps with minimal restart and approximate learning , 2013, OOPSLA.
[9] Kent L. Beck,et al. Test-driven Development - by example , 2002, The Addison-Wesley signature series.
[10] Michael Howard,et al. Measuring Relative Attack Surfaces , 2005 .
[11] Zijiang Yang,et al. Policy analysis for administrative role based access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[12] Daryl McCullough,et al. Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.
[13] Trent Jaeger,et al. PRIMA: policy-reduced integrity measurement architecture , 2006, SACMAT '06.
[14] Trent Jaeger,et al. A logical specification and analysis for SELinux MLS policy , 2007, SACMAT '07.
[15] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[16] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[17] References , 1971 .
[18] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[19] Wayne Salamon,et al. Implementing SELinux as a Linux Security Module , 2003 .
[20] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[21] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[22] Peng Ning,et al. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning , 2015, USENIX Security Symposium.
[23] Sam Malek,et al. Testing android apps through symbolic execution , 2012, ACM SIGSOFT Softw. Eng. Notes.
[24] A. Jefferson Offutt,et al. Constraint-Based Automatic Test Data Generation , 1991, IEEE Trans. Software Eng..
[25] Trent Jaeger,et al. Analyzing Integrity Protection in the SELinux Example Policy , 2003, USENIX Security Symposium.
[26] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[27] Trent Jaeger,et al. Integrity walls: finding attack surfaces from mandatory access control policies , 2012, ASIACCS '12.
[28] Trent Jaeger,et al. Resolving constraint conflicts , 2004, SACMAT '04.
[29] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[30] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[31] Nir Friedman,et al. Learning Bayesian Network Structure from Massive Datasets: The "Sparse Candidate" Algorithm , 1999, UAI.
[32] Gail-Joon Ahn,et al. Visualization based policy analysis: case study in SELinux , 2008, SACMAT '08.
[33] Hong Chen,et al. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems , 2009, NDSS.
[34] K. Burr,et al. Combinatorial Test Techniques : Table-based Automation , Test Generation and Code Coverage , 1998 .
[35] N. Asokan,et al. Characterizing SEAndroid Policies in the Wild , 2016, ICISSP.
[36] Sarfraz Khurshid,et al. Test input generation with java PathFinder , 2004, ISSTA '04.