登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
安卓隐私安全研究进展
参考文献
  • [1] 杨广亮,龚晓锐,姚刚,韩心慧. 一个面向Android的隐私泄露检测系统. 计算机工程, 2012,23
  • [2] 蒋绍林,王金双,于晗,张涛,陈融. 改进的Android强制访问控制模型. 计算机应用, 2013,06
  • [3] 戴威,郑滔. 基于Android权限机制的动态隐私保护模型. 计算机应用研究, 2012,09
  • [4] 刘昌平,范明钰,王光卫,郑秀林,宫亚峰. Android手机的轻量级访问控制. 计算机应用研究, 2010,07
  • [5] 闫梅,彭新光. 基于Android安全机制的权限检测系统. 计算机工程与设计, 2013,03
  • [6] ZHOU Ya-jin,JIANG Xu-xian.Dissecting Android malware:characterization and evolution[C]//Proc of IEEE Symposium on Security and Privacy.Washington DC:IEEE Computer Society,2012:95-109.. 2012
  • [7] ENCK W,OCTEAU D,McDANIEL P,etal.A study of Android application security[C]//Proc of the 20th USENIX Security Symposium.Berkeley:USENIX Association,2011:64-76.. 2011
  • [8] YAN L K,YIN Heng.DroidScope:seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis[C]//Proc of the 21st USENIX Security Symposium.Berkeley:USENIX Association,2012:135-146.. 2012
  • [9] GILBERT P,CHUN B G,COX L,et al.Automating privacy testing of smartphone applications,CS-2011-02[R].[S.l.]:Duke University,2011.. 2011
  • [10] CHAUDHURI A.Language-based security on Android[C]//Proc of the 4th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security.New York:ACM Press,2009:1-7.. 2009
  • [11] JIA Li-min,ALJURAIDAN J,FRAGKAKI E,et al.Run-time enforcement of information-flow properties on Android[C]//Computer Security-ESORICS.Berlin:Springer,2013:775-792.. 2013
  • [12] DAM M,Le GUERNIC G,LUNDBLAD A.TreeDroid:a tree automaton based approach to enforcing data processing policies[C]//Proc of ACM Conference on Computer and Communications Security.New York:ACM Press,2012:894-905.. 2012
  • [13] SHIN W,KIYOMOTO S,FUKUSHIMA K,et al.A formal model to analyze the permission authorization and enforcement in the Android framework[C]//Proc of the 2nd International Conference on Social Computing.Washington DC:IEEE Computer Society,2010:944-951.. 2010
  • [14] PEARCE P,FELT A P,NUNEZ G,et al.AdDroid:privilege separation for applications and advertisers in Android[C]//Proc of the 7th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2012:71-72.. 2012
  • [15] WU Dong-jie,MAO C H,WEI T E,et al.DroidMat:Android malware detection through manifest and API calls tracing[C]//Proc of the 7th Asia Joint Conference on Information Security.2012:62-69.. 2012
  • [16] ONGTANG M,McLAUGHLIN S,ENCK W,et al.Semantically rich application-centric security in Android[J].Security and Communication Networks,2012,5(6):658-673.. 2012
  • [17] NAUMAN M,KHAN S,ZHANG Xin-wen.Apex:extending Android permission model and enforcement with user-defined runtime constraints[C]//Proc of the 5th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2010:328-332.. 2010
  • [18] BENATS G,BANDARA A,YU Yi-jun,et al.PrimAndroid:privacy policy modelling and analysis for Android applications[C]//Proc of IEEE International Symposium on Policies for Distributed Systems and Networks.2011:129-132.. 2011
  • [19] BERESFORD A R,RICE A,SKEHIN N,et al.MockDroid:trading privacy for application functionality on smartphones[C]//Proc of the 12th Workshop on Mobile Computing Systems and Applications.New York:ACM Press,2011:49-54.. 2011
  • [20] DIETZ M,SHEKHAR S,PISETSKY Y,et al.Quire:lightweight provenance for smart phone operating systems[C]//Proc of the 20th USENIX Security Symposium.Berkeley:USENIX Association,2011:232-241.. 2011
  • [21] BUGIEL S,DAVI L,DMITRIENKO A,et al.Towards taming privilege-escalation attacks on Android[C]//Proc of the 19th Annual Network & Distributed System Security Symposium.San Diego:Internet Society,2012:18-25.. 2012
  • [22] LU Long,LI Zhi-chun,WU Zhen-yu,et al.CHEX:statically vetting Android apps for component hijacking vulnerabilities[C]//Proc of ACM Conference on Computer and Communications Security.New York:ACM Press,2012:229-240.. 2012
  • [23] FRAGKAKI E,BAUER L,JIA Lmin,et al.Modeling and enhancing Android's permission system[M]//Computer Security-ESORICS.Berlin:Springer,2012:1-18.. 2012
  • [24] BUGIEL S,DAVI L,DMITRIENKO A,et al.XManDroid:a new Android evolution to mitigate privilege escalation attacks,TR-2011-04[R].Darmstadt:Technische Universit(a)t Darmstadt,2011.. 2011
  • [25] ZHOU Ya-jin,JIANG Xu-xian.Detecting passive content leaks and pollution in Android applications[C]//Proc of the 20th Annual Symposium on Network and Distributed System Security.San Diego:Internet Society,2013:434-443.. 2013
  • [26] PARK Y,LEE C,LEE C,et al.RGBDroid:a novel response-based approach to Android privilege escalation attacks[C]//Proc of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats.Berkeley:USENIX Association,2012:56-67.. 2012
  • [27] SMALLEY S,CRAIG R.Security enhanced (SE) Android:bringing flexible MAC to Android[C]//Proc of the 20th Annual Network & Distributed System Security Symposium.San Diego:Intemet Society,2013:75-84.. 2013
  • [28] RUSSELLO G,CRISPO B,FERNANDES E,et al.YAASE:yet another Android security extension[C]//Proc of the 3rd International Conference on Privacy,Security,Risk and Trust Social Computing.USA:IEEE Press,2011:1033-1040.. 2011
  • [29] GRACE M,ZHOU Ya-jin,WANG Zhi,et al.Systematic detection of capability leaks in stock Android smartphones[C]//Proc of the 19th Annual Symposium on Network and Distributed System Security.San Diego:Internet Society,2012:235-244.. 2012
  • [30] Di CERBO F,GIRARDELLO A,MICHAHELLES F,et al.Detection of malicious applications on Android OS[C]//Proc of the 4th International Conference on Computational Forensics.Berlin:Springer,2011:138-149.. 2011
  • [31] FELT A P,CHIN E,HANNA S,etal.Android permissions demystified[C]//Proc of the 18th ACM Conference on Computer and Communications Security.New York:ACM Press,2011:627-638.. 2011
  • [32] MEURER S,WISM(U)LLER R.APEFS:an infrastructure for permission-based filtering of Android apps[C]//Security and Privacy in Mobile Information and Communication Systems.Berlin:Springer,2012:1-11.. 2012
  • [33] FRITZ C,ARZT S,RASTHOFER S,et al.Highly precise taint analysis for Android application,TUD-CS-2013-0113[R/OL].(2013-05-08).http://www.bodden.de/pubs/TUD-CS-2013-0113.. 2013
  • [34] ENCK W,GILBERT P,CHUN B G,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C]//Proc of the 9th USENIX Conference on Operating System Design and Implementation.Berkeley:USENIX Association,2010:255-270.. 2010
  • [35] MANN C,STAROSTIN A.A framework for static detection of privacy leaks in Android applications[C]//Proc of the 27th Annual ACM Symposium on Applied Computing.New York:ACM Press,2012:1457-1462.. 2012
  • [36] XIAO Xu-sheng,TILLMANN N,FAHNDRICH M,et al.User-aware privacy control via extended static-information-flow analysis[C]//Proc of the 27th IEEE/ACM International Conference on Automated Software Engineering.New York:ACM Press,2012:80-89.. 2012
  • [37] GIBLER C,CRUSSELL J,ERICKSON J,et al.AndroidLeaks:automatically detecting potential privacy leaks in Android applications on a large scale[C]//Proc of the 5th International Conference on Trust and Trustworthy Computing.Berlin:Springer,2012:291-307.. 2012
  • [38] Di CERBO F,GIRARDELLO A,MICHAHELLES F,et al.Detection of malicious applications on Android OS[C]//Proc of the 4th International Conference on Computational Forensics.Berlin:Springer,2011:138-149.. 2011
  • [39] XU Ru-bin,SA(I)DI H,ANDERSON R.Aurasium:practical policy enforcement for Android applications[C]//Proc of the 21 st USENIX Security Symposium.Berkeley:USENIX Association,2012:32-44.. 2012
  • [40] FELTA P,FINIFTER M,CHIN E,et al.A survey of mobile malware in the wild[C]//Proc of the 1 st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York:ACM Press,2011:3-14.. 2011
  • [41] LaPOLLA M,MARTINELLI F,SGANDURRA D.A survey on security for mobile devices[J].IEEE Communications Surveys & Tutorials,2012,15 (1):108-117.. 2012
  • [42] VIDAS T,VOTIPKA D,CHRISIM N.All your droid are belong to us:a survey of current Android attacks[C]//Proc of the 5 th USENIX Conference on Offensive Technologies.Berkeley:USENIX Association,2011:10.. 2011
  • [43] ENCK W,ONGTANG M,McDANIEL P.Understanding Android security[J].IEEE Security & Privacy,2009,7(1):50-57.. 2009
  • [44] BARRERA D,KAYACIK H G,Van OORSCHOT P C,et al.A methodology for empirical analysis of permission-based security models and its application to Android[C]//Proc of the 17th ACM Conference on Computer and Communications Security.New York:ACM Press,2010:73-84.. 2010
  • [45] FELT A P,HA E,EGELMAN S,et al.Android permissions:user attention,comprehension,and behavior[C]//Proc of the 8th Symposium on Usable Privacy and Security.New York:ACM Press,2012.. 2012
  • [46] ROESNER F,KOHNO T,MOSHCHUK A,et al.User-driven access control:rethinking permission granting in modern operating systems[C]//Proc of IEEE Symposium on Security and Privacy.Washington DC:IEEE Computer Society,2012:224-238.. 2012
  • [47] MARFORIO C,FRANCILLON A,CAPKUN S,et al.Application collusion attack on the permission-based security model and its implications for modern smartphone systems[R].Zurich:ETH Zurich,2011.. 2011
  • [48] FELT A P,WANG H J,MOSHCHUK A,et al.Permission re-delegation:attacks and defenses[C]//Proc of the 20th USENIX Security Symposium.Berkeley:USENIX Association,2011:19-31.. 2011
  • [49] DAVI L,DMITRIENKO A,SADEGHI A R,et al.Privilege escalation attacks on Android[C]//Proc of the 13th Conference on Information Security.Berlin:Springer,2011:346-360.. 2011
  • [50] AUK W Y,ZHOU Yi-fan,HUANG Zhen,et al.PScout:analyzing the Android permission specification[C]//Proc of ACM Conference on Computer and Communications Security.New York:ACM Press,2012:217-228.. 2012
  • [51] ENCK W,ONGTANG M,McDANIEL P.On lightweight mobile phone application certification[C]//Proc of the 16th ACM Conference on Computer and Communications Security.New York:ACM Press,2009:235-245.. 2009
  • [52] CHEN K Z,JOHNSON N,D' SILVA V,et al.Contextual policy enforcement in Android programs with permission event graphs[C]//Proc of the 20th Annual Network and Distributed System Security Symposium.San Diego:Internet Society,2013:455-464.. 2013
  • [53] SCHRECKLING D,POSEGGA J,HAUSKNECHT D.Constroid:data-centric access control for Android[C]//Proc of the 27th Annual ACM Symposium on Applied Computing.New York:ACM Press,2012:1478-1485.. 2012
查看更多︾
相似文献 查看更多>>
18.208.159.25