Author:
Choi Junho,Sung Woon,Choi Chang,Kim Pankoo
Subject
Software,Computer Science Applications,Hardware and Architecture,Computer Networks and Communications,Information Systems
Reference23 articles.
1. Kynoid: real-time enforcement of fine-grained, user-defined, and data-centric security policies for android;Schreckling,2012
2. P. Chan, L. Hui, S. Yiu, DroidChecker: Analyzing android applications for capability leak, in: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012, pp. 125–136.
3. A semantic context-based model for mobile web services;Shen,2011
4. Y. Park, C. Lee, C. Lee, J. Lim, S. Han, M. Park, S. Cho, RGBDroid: A novel response-based approach to android privilege escalation attacks, in: USENIX LEET’12, 2012.
5. L. Tenenboim-Chekina, O. Barad, A. Shabtai, D. Mimran, L. Rokach, B. Shapira, Y. Elovici, Detecting application update attack on mobile devices through network features, in: INFOCOM’2013, 2013.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献