五大安全会议 - Android安全文章
Android security list
说明:此清单包括近几年CCS、NDSS、ASIACCS、S&P、USENIX五大安全会议上有关安卓安全的全部文章,若有遗漏欢迎添加。(68篇) Part 1 ASIACCS 2013
1、DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks
2、On the Effectiveness of API-Level Access Control Using Bytecode Rewriting in Android
3、AdDroid: Privilege Separation for Applications and Advertisers in Android
4、AppInk: Watermarking Android Apps for Repackaging Deterrence 2014
1、DroidRay: A Security Evaluation System for Customized Android Firmwares
2、VirtualSwindle: An Automated Attack Against In-App Billing on Android
3、Evading Android Runtime Analysis via Sandbox Detection
4、APKLancet: Tumor Payload Diagnosis and Purification for Android Applications
Part 2 CCS 2009
1、 On Lightweight Mobile Phone Application Certification
- 2 -
五大安全会议 - Android安全文章
2010 1、A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android 2011
1、POSTER: The Quest for Security against Privilege Escalation Attacks on Android 2012
1、Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security
2、PScout: Analyzing the Android Permission Specification
3、CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities
4、Using Probabilistic Generative Models for Ranking Risks of Android Apps 2013
1、An Empirical Study of Cryptographic Misuse in Android Applications
2、AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection
3、Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources
4、Rethinking SSL Development in an Appified World
5、Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns
6、The Impact of Vendor Customizations on Android Security
7、Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis
- 2 -
五大安全会议 - Android安全文章
2014 1、POSTER: LocMask: A Location Privacy Protection Framework in Android System
2、Framework in Android System Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
3、Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers
4、AutoCog: Measuring the Description-to-permission Fidelity in Android Applications
5、Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs Part3 NDSS 2013
1、 Unobservable Re-authentication for Smartphones
2、 Security Enhanced (SE) Android: Bringing Flexible MAC to Android
3、 Detecting Passive Content Leaks and Pollution in Android Applications
4、 Contextual Policy Enforcement in Android Applications with Permission Event Graphs
5、 Comparing Mobile Privacy Protection through Cross-Platform Applications 2014
1、 Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
2、Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
- 2 -