好文档 - 专业文书写作范文服务资料分享网站

android_security_list

天下 分享 时间: 加入收藏 我要投稿 点赞

说明:此清单包括近几年CCS、NDSS、ASIACCS、S&P、USENIX五大安全会议上有关安卓安全的全部文章,若有遗漏欢迎添加。

Part 1 ASIACCS

2013

1、DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks

2、On the Effectiveness of API-Level Access Control Using Bytecode Rewriting in Android

3、AdDroid: Privilege Separation for Applications and Advertisers in Android

4、AppInk: Watermarking Android Apps for Repackaging Deterrence

2014

1、DroidRay: A Security Evaluation System for Customized Android Firmwares

2、VirtualSwindle: An Automated Attack Against In-App Billing on Android 3、Evading Android Runtime Analysis via Sandbox Detection

4、APKLancet: Tumor Payload Diagnosis and Purification for Android Applications

Part 2 CCS

2009

1、 On Lightweight Mobile Phone Application Certification

2010

1、A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android

2011

1、POSTER: The Quest for Security against Privilege Escalation Attacks on Android

2012

1、Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security

2、PScout: Analyzing the Android Permission Specification

3、CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

4、Using Probabilistic Generative Models for Ranking Risks of Android Apps

2013

1、An Empirical Study of Cryptographic Misuse in Android Applications 2、AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection

3、Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources

4、Rethinking SSL Development in an Appified World

5、Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns

6、The Impact of Vendor Customizations on Android Security

7、Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis

2014

1、POSTER: LocMask: A Location Privacy Protection Framework in Android System

2、Framework in Android System Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps 3、Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers

4、AutoCog: Measuring the Description-to-permission Fidelity in Android Applications

5、Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs

Part 3 NDSS

2013

1、 Unobservable Re-authentication for Smartphones

2、 Security Enhanced (SE) Android: Bringing Flexible MAC to Android 3、 Detecting Passive Content Leaks and Pollution in Android Applications 4、 Contextual Policy Enforcement in Android Applications with Permission

Event Graphs

5、 Comparing Mobile Privacy Protection through Cross-Platform

Applications

2014

1、 Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in

Android Applications 2、 AppSealer: Automatic Generation of Vulnerability-Specific Patches for

Preventing Component Hijacking Attacks in Android Applications 3、 Drebin: Effective and Explainable Detection of Android Malware in Your

Pocket 4、 Inside Job: Understanding and Mitigating the Threat of External Device

Mis-Bonding on Android 5、 Smartphones as Practical and Secure Location Verification Tokens for

Payments 6、 AirBag: Boosting Smartphone Resistance to Malware Infection 7、 Screenmilker: How to Milk Your Android Screen for Secrets 8、 A Machine-learning Approach for Classifying and Categorizing Android

Sources and Sinks 9、 SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS

Man-in-the-Middle Vulnerabilities in Android Apps

其他:

1、Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

2、PiOS: Detecting Privacy Leaks in iOS Applications 3、FreeMarket: Shopping for free in Android applications 4、Towards Taming Privilege-Escalation Attacks on Android

5、Systematic Detection of Capability Leaks in Stock Android Smartphones 6、Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications

android_security_list

说明:此清单包括近几年CCS、NDSS、ASIACCS、S&P、USENIX五大安全会议上有关安卓安全的全部文章,若有遗漏欢迎添加。Part1ASIACCS20131、DroidChameleon:EvaluatingAndroidAnti-malwareagainstTransformationAttacks
推荐度:
点击下载文档文档为doc格式
0250e1b31g3gznb0fxdx
领取福利

微信扫码领取福利

微信扫码分享