-
Notifications
You must be signed in to change notification settings - Fork 1
/
references.bib
152 lines (134 loc) · 5.29 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
@inproceedings{huang2012crax,
title={CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations},
author={Huang, Shih-Kun and Huang, Min-Hsiang and Huang, Po-Yen and Lai, Chung-Wei and Lu, Han-Lin and Leong, Wai-Meng},
booktitle={Software Security and Reliability (SERE), 2012 IEEE Sixth International Conference on},
pages={78--87},
year={2012},
organization={IEEE}
}
@article{chipounov2011s2e,
title={S2E: A platform for in-vivo multi-path analysis of software systems},
author={Chipounov, Vitaly and Kuznetsov, Volodymyr and Candea, George},
journal={ACM SIGARCH Computer Architecture News},
volume={39},
number={1},
pages={265--278},
year={2011},
publisher={ACM}
}
@inproceedings{enck2010taintdroid,
title={TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.},
author={Enck, William and Gilbert, Peter and Chun, Byung-Gon and Cox, Landon P and Jung, Jaeyeon and McDaniel, Patrick and Sheth, Anmol},
booktitle={OSDI},
volume={10},
pages={1--6},
year={2010}
}
@inproceedings{yang2013appintent,
title={Appintent: Analyzing sensitive data transmission in android for privacy leakage detection},
author={Yang, Zhemin and Yang, Min and Zhang, Yuan and Gu, Guofei and Ning, Peng and Wang, X Sean},
booktitle={Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security},
pages={1043--1054},
year={2013},
organization={ACM}
}
@inproceedings{zhou2013detecting,
title={Detecting passive content leaks and pollution in android applications},
author={Zhou, Yajin and Jiang, Xuxian},
booktitle={Proceedings of the 20th Annual Symposium on Network and Distributed System Security},
year={2013}
}
@article{fritz2013highly,
title={Highly precise taint analysis for android applications},
author={Fritz, Christian and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and le Traon, Yves and Octeau, Damien and McDaniel, Patrick},
journal={EC SPRIDE, TU Darmstadt, Tech. Rep},
year={2013}
}
@inproceedings{fedler2013native,
title={Native code execution control for attack mitigation on android},
author={Fedler, Rafael and Kulicke, Marcel and Sch{\"u}tte, Julian},
booktitle={Proceedings of the Third ACM workshop on Security and privacy in smartphones \& mobile devices},
pages={15--20},
year={2013},
organization={ACM}
}
@inproceedings{ho2014prec,
title={PREC: practical root exploit containment for android devices},
author={Ho, Tsung-Hsuan and Dean, Daniel and Gu, Xiaohui and Enck, William},
booktitle={Proceedings of the 4th ACM conference on Data and application security and privacy},
pages={187--198},
year={2014},
organization={ACM}
}
@article{davi2010return,
title={Return-oriented programming without returns on ARM},
author={Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel},
journal={System Security Lab-Ruhr University Bochum, Tech. Rep},
year={2010}
}
@article{kornau2010return,
title={Return oriented programming for the ARM architecture},
author={Kornau, Tim},
journal={Master's thesis, Ruhr-Universitat Bochum},
year={2010}
}
@inproceedings{felt2011android,
title={Android permissions demystified},
author={Felt, Adrienne Porter and Chin, Erika and Hanna, Steve and Song, Dawn and Wagner, David},
booktitle={Proceedings of the 18th ACM conference on Computer and communications security},
pages={627--638},
year={2011},
organization={ACM}
}
@article{enck2009understanding,
title={Understanding Android Security.},
author={Enck, William and Ongtang, Machigar and McDaniel, Patrick Drew},
journal={IEEE Security \& Privacy},
volume={7},
number={1},
pages={50--57},
year={2009}
}
@article{davi2011privilege,
title={Privilege escalation attacks on android},
author={Davi, Lucas and Dmitrienko, Alexandra and Sadeghi, Ahmad-Reza and Winandy, Marcel},
journal={Information Security},
pages={346--360},
year={2011},
publisher={Springer Berlin Heidelberg}
}
@article{hobarth2011framework,
title={A framework for on-device privilege escalation exploit execution on Android},
author={H{\"o}barth, Sebastian and Mayrhofer, Rene},
journal={Proceedings of IWSSI/SPMU},
year={2011}
}
@inproceedings{huang2013craxweb,
title={CRAXweb: Automatic Web Application Testing and Attack Generation},
author={Huang, Shih-Kun and Lu, Han-Lin and Leong, Wai-Meng and Liu, Huan},
booktitle={Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on},
pages={208--217},
year={2013},
organization={IEEE}
}
@inproceedings{yan2012droidscope,
title={DroidScope: Seamlessly Reconstructing the OS and Dalvik},
author={Yan, LK and Yin, H},
booktitle={Proceedings of USENIX Security Symposium. USENIX Association},
year={2012}
}
! Websites
@online{cisco2014vni,
author={Cisco},
title={Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013–2018},
month={Feb},
year={2014},
url={http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html},
}
@online{google2012bouncer,
author={Google},
title={Android and Security},
month={Feb},
year={2012},
url={http://googlemobile.blogspot.tw/2012/02/android-and-security.html},
}