최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Computers & security, v.43, 2014년, pp.205 - 218
Fang, Z. , Han, W. , Li, Y.
Android security has been a hot spot recently in both academic research and public concerns due to numerous instances of security attacks and privacy leakage on Android platform. Android security has been built upon a permission based mechanism which restricts accesses of third-party Android applica...
Android 2011 Gmail - android market
Android 2013
Android 2013 Manifest.permission
Au 217 2012 Proc. of ACM CCS Pscout: analyzing the android permission specification
Barrera 73 2010 Proc. of ACM CCS A methodology for empirical analysis of permission-based security models and its application to android
Beresford 49 2011 Proc. of HotMobile. ACM Mockdroid: trading privacy for application functionality on smartphones
Bugiel 2011 XManDroid: a new Android evolution to mitigate privilege escalation attacks
Bugiel 2012 Proc. of NDSS Towards taming privilege-escalation attacks on android
Bugiel 741 2011 Proc. of ACM CCS Poster: the quest for security against privilege escalation attacks on android
Bugiel 2013 Usenix security Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
Chen 2013 NDSS Contextual policy enforcement in android applications with permission event graphs
Inf Secur Conti 331 2011 10.1007/978-3-642-18178-8_29 Crepe: context-related policy enforcement for android
Inf Secur Davi 346 2011 10.1007/978-3-642-18178-8_30 Privilege escalation attacks on android
Dietz 2011 Proc. of USENIX security Quire: lightweight provenance for smart phone operating systems
Enck 1 2010 Proc. of USENIX OSDI Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Enck 2011 2011 A study of android application security
Enck 2008 Mitigating android software misuse before it happens
Enck 235 2009 Proc. of ACM CCS On lightweight mobile phone application certification
F-Secure 2013 Mobile threat report January-March 2013
Felt 22 2011 Proc. of USENIX security Permission re-delegation: attacks and defenses
Felt 627 2011 Proc. of ACM CCS Android permissions demystified
Felt 7 2011 Proc. of USENIX WebApps The effectiveness of application permissions
Felt 3 2012 Proc. of SOUPS Android permissions: user attention, comprehension, and behavior
Fragkaki 1 2012 Computer Security-ESORICS 2012 Modeling and enhancing android's permission system
Google 2012 Android and security
IEEE Veh Technol Mag Gozalvez 3 4 3 2008 10.1109/MVT.2008.931524 First googles android phone launched
Grace 2012 Proc. of NDSS Systematic detection of capability leaks in stock android smartphones
IEEE TPDS Han 24 1 1 2013 Collaborative policy administration
Comput Networks Han 56 1 477 2012 10.1016/j.comnet.2011.09.014 A survey on policy languages in network and security management
Hornyack 639 2011 Proc. of ACM CCS These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
IDC 2013 Android and ios combine for 92.3operating system shipments in the first quarter while windows phone leapfrogs blackberry, according to idc
Jeon 3 2012 Proc. of ACM SPSM Dr. android and mr. hide: fine-grained permissions in android applications
Jia 775 2013 ESORICS Run-time enforcement of information-flow properties on android - (extended abstract)
Kemmerer 109 2002 Proc. of ACSAC A practical approach to identifying storage and timing channels: twenty years later
Leontiadis 2 2012 Proc. of HotMobile Don’t kill my ads!: balancing privacy in an ad-supported mobile application market
Marforio 2011 Application collusion attack on the permission-based security model and its implications for modern smartphone systems
Marforio 51 2012 Proc. of ACSAC Analysis of the communication between colluding applications on modern smartphones
Mueller 2011 Proc. of IEEE S&P Poster: Flex-p: flexible android permissions
Nauman 328 2010 Proc. of ACM ASIACCS Apex: extending android permission model and enforcement with user-defined runtime constraints
Secur Commun Networks Ongtang 5 6 658 2011 10.1002/sec.360 Semantically rich application-centric security in android
Pearce 71 2012 Proc. of ACM ASIACCS Addroid: privilege separation for applications and advertisers in android
Commun ACM Saltzer 17 7 388 1974 10.1145/361011.361067 Protection and the control of information sharing in multics
Sarma 13 2012 Proc. of ACM SACMAT Android permissions: a perspective combining risks and benefits
Schlegel 17 2011 Proc. of NDSS Soundcomber: a stealthy and context-aware sound trojan for smartphones
Schmidt 2008 Proc. of 15th International Linux Kongress Enhancing security of linux-based android devices
CoRR Shekhar 28 2012 Adsplit: separating smartphone advertising from applications
Shin 107 2010 IEEE POLICY A small but non-negligible flaw in the android permission scheme
Smalley 2013 NDSS Security enhanced (se) android: Bringing flexible mac to android
Vennon 24 2010 Android malware. a study of known and potential malware threats
Vidas vol 2 2011 Curbing android permission creep
Wei 31 2012 Proc. of ACSAC Permission evolution in the android ecosystem
Welch 2013 Google: 900 million android activations to date, 48 billion app installs
Xu 27 2012 Proc. of USENIX security Aurasium: practical policy enforcement for android applications
Zhang 19 2013 Proceedings of the first international workshop on Security in embedded systems and smartphones Role mining algorithm evaluation and improvement in large volume android applications
Zhou 93 2011 Proc. of TRUST Taming information-stealing smartphone applications (on android)
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
저자가 공개 리포지터리에 출판본, post-print, 또는 pre-print를 셀프 아카이빙 하여 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.