Author:
Graa Mariem,Lobe Kome Ivan Marco,Cuppens-Boulahia Nora,Cuppens Frédéric,Frey Vincent
Publisher
Springer International Publishing
Reference28 articles.
1. Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Not. 49(6), 259–269 (2014)
2. Blanchet, B.: Symbolic verification of TLS 1.3 with ProVerif. https://github.com/inria-prosecco/reftls
3. Cervesato, I.: The Dolev-Yao intruder is the most powerful attacker. In: 16th Annual Symposium on Logic in Computer ScienceLICS, vol. 1. Citeseer (2001)
4. Dick Hardt, E.: The OAuth 2.0 Authorization Framework. https://tools.ietf.org/html/rfc6749
5. Do, Q., Martini, B., Choo, K.K.R.: Exfiltrating data from android devices. Comput. Secur. 48, 74–91 (2015)