![]() ![]() 340–349 (December 2009)ĭietz, M., Shekhar, S., Wallach, D.S., Pisetsky, Y., Shu, A.: Quire: Lightweight provenance for smart phone operating systems, San Francisco, CA (August 2011) In: Computer Security Applications Conference, ACSAC 2009, pp. Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in android. In: 20th Usenix Security Symposium (2011) In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS (2011)įelt, A.P., Hanna, S., Chin, E., Wang, H.J., Moshchuk, E.: Permission re-delegation: Attacks and defenses. USENIX Security Symposium (2011)įelt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. ACM (2009)Įnck, W., Cox, L.P., Jung, J., et al.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones, Vancouver, BC (October 2010)Įnck, W., Octeau, D., Mcdaniel, P., Chaudhuri, S.: A study of android application security. In: ACM Conference on Computer and Communications Security, pp. ![]() Enck, W., Ongtang, M., Mcdaniel, P.: On lightweight mobile phone application certification.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |