说明:此清单包括近几年CCS、NDSS、ASIACCS、S&P、USENIX五大安全会议上有关安卓安全的全部文章,若有遗漏欢迎添加。
Part 1 ASIACCS
2013
1、DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks
2、On the Effectiveness of API-Level Access Control Using Bytecode Rewriting in Android
3、AdDroid: Privilege Separation for Applications and Advertisers in Android
4、AppInk: Watermarking Android Apps for Repackaging Deterrence
2014
1、DroidRay: A Security Evaluation System for Customized Android Firmwares
2、VirtualSwindle: An Automated Attack Against In-App Billing on Android 3、Evading Android Runtime Analysis via Sandbox Detection
4、APKLancet: Tumor Payload Diagnosis and Purification for Android Applications
Part 2 CCS
2009
1、 On Lightweight Mobile Phone Application Certification
2010
1、A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
2011
1、POSTER: The Quest for Security against Privilege Escalation Attacks on Android
2012
1、Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security
2、PScout: Analyzing the Android Permission Specification
3、CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities
4、Using Probabilistic Generative Models for Ranking Risks of Android Apps
2013
1、An Empirical Study of Cryptographic Misuse in Android Applications 2、AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection
3、Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources
4、Rethinking SSL Development in an Appified World
5、Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns
6、The Impact of Vendor Customizations on Android Security
7、Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis
2014
1、POSTER: LocMask: A Location Privacy Protection Framework in Android System
2、Framework in Android System Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps 3、Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers
4、AutoCog: Measuring the Description-to-permission Fidelity in Android Applications
5、Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs
Part 3 NDSS
2013
1、 Unobservable Re-authentication for Smartphones
2、 Security Enhanced (SE) Android: Bringing Flexible MAC to Android 3、 Detecting Passive Content Leaks and Pollution in Android Applications 4、 Contextual Policy Enforcement in Android Applications with Permission
Event Graphs
5、 Comparing Mobile Privacy Protection through Cross-Platform
Applications
2014
1、 Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in
Android Applications 2、 AppSealer: Automatic Generation of Vulnerability-Specific Patches for
Preventing Component Hijacking Attacks in Android Applications 3、 Drebin: Effective and Explainable Detection of Android Malware in Your
Pocket 4、 Inside Job: Understanding and Mitigating the Threat of External Device
Mis-Bonding on Android 5、 Smartphones as Practical and Secure Location Verification Tokens for
Payments 6、 AirBag: Boosting Smartphone Resistance to Malware Infection 7、 Screenmilker: How to Milk Your Android Screen for Secrets 8、 A Machine-learning Approach for Classifying and Categorizing Android
Sources and Sinks 9、 SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS
Man-in-the-Middle Vulnerabilities in Android Apps
其他:
1、Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
2、PiOS: Detecting Privacy Leaks in iOS Applications 3、FreeMarket: Shopping for free in Android applications 4、Towards Taming Privilege-Escalation Attacks on Android
5、Systematic Detection of Capability Leaks in Stock Android Smartphones 6、Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications