Author:
Bauer Andreas,Küster Jan-Christoph,Vegliach Gil
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. (TOSEM) 20(4), 14 (2011)
2. Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proc. 6th Int. Conf. Mobile Systems, Applications, and Services (MobiSys), pp. 225–238. ACM (2008)
3. Lecture Notes in Computer Science;F. Chen,2005
4. Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proc. 9th USENIX Symp. on OS Design and Implementation (OSDI). USENIX (2010)
5. Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proc. 18th ACM Conf. Comp. and Comm. Security (CCS), pp. 627–638. ACM (2011)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Runtime Verification of Crypto APIs: An Empirical Study;IEEE Transactions on Software Engineering;2023-10-01
2. Design and Implementation of Self-Protecting systems: A Formal Approach;Future Generation Computer Systems;2021-02
3. Self-protection against business logic vulnerabilities;Proceedings of the IEEE/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems;2020-06-29
4. Android-SRV: Scenario-Based Runtime Verification of Android Applications;International Journal of Software Engineering and Knowledge Engineering;2018-02
5. Predictive runtime verification of timed properties;Journal of Systems and Software;2017-10