![]() Zhauniarovich, Y.: Android security (and not) internals In: 21st Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, 23–26 February. Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., Vigna, G.: Execute this! analyzing unsafe, malicious dynamic code loading in android applications. Grace, M.C., Zhou, Y., Wang, Z., Jiang, X.: Systematic detection of capability leaks in stock android smartphones. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. ACM (2012)Įnck, W., Ongtang, M., McDaniel, P.: Understanding android security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. doi: 10.1007/978-4-2_4įelt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J., Prevenhueber, O.: Android security permissions–can we trust them? In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. USENIX Association (2011)ĭavi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on Android. In: Proceedings of the 20th USENIX Conference on Security, p. Vigneri, L., Chandrashekar, J., Pefkianakis, I., Heen, O.: Taming the android appstore: lightweight characterization of android applications, CoRR abs/1504.06093Įnck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. Graham, R.: Extracting the superfish certificate (2015). In: IEEE Symposium on Security and Privacy (SP), pp. Thomas, K., Bursztein, E., Grier, C., Ho, G., Jagpal, N., Kapravelos, A., McCoy, D., Nappa, A., Paxson, V., Pearce, P., et al.: Ad injection at scale: assessing deceptive advertisement modifications. Mills, E.: Malware delivered by yahoo, fox, google ads (2010). Hoffman-Andrews, J.: Verizon injecting perma-cookies to track mobile customers, bypassing privacy controls (2014).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |