QUIRE: Lightweight Provenance for Smart Phone Operating Systems

by Michael Dietz , Shashi Shekhar , Dan S. Wallach , Yuliy Pisetsky , Anhei Shu
Citations:41 - 1 self

Active Bibliography

11 AdSplit: Separating smartphone advertising from applications – Shashi Shekhar, Michael Dietz, Dan S. Wallach - 2012
55 Mostly-Static Decentralized Information Flow Control – Andrew C. Myers - 1999
22 Type-based distributed access control – Tom Chothia, Dominic Duggan - 2003
Helping Developers Construct Secure Mobile Applications – Erika Chin, Erika Michelle Chin, Erika Michelle Chin
39 Permission re-delegation: Attacks and defenses – Adrienne Porter Felt, Steven Hanna, Erika Chin, Helen J. Wang, Er Moshchuk - 2011
Flow Properties on Android – Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Jassim Aljuraidan, Lujo Bauer, Elli Fragkaki, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake - 2012
Security, Measurement – Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-rotaru, Ian Molloy, Android Malware
CMU-CyLab-11-020 – Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey, Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey - 2011
AFrame: Isolating Advertisements from Mobile Applications in Android ∗ – Xiao Zhang, Amit Ahlawat, Wenliang Du
3 Modeling and Enhancing Android’s Permission System – Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
2 Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications – Jinseong Jeon, Ari Fogel, Jeffrey S. Foster, Kristopher K. Micinski, Nikhilesh Reddy, Todd Millstein, Jeffrey A. Vaughan
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies – Sven Bugiel, Ahmad-reza Sadeghi
1 Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware – Sven Bugiel, Stephan Heuser, Ahmad-reza Sadeghi, Technische Universität Darmstadt - 2012
2 Dr. Android and Mr. Hide: Fine-grained security policies on unmodified – Jinseong Jeon, Nikhilesh Reddy, Jeffrey S. Foster, Kristopher K. Micinski, Yixin Zhu, Todd Millstein, Jeffrey A. Vaughan
4 Application-centric security policies on unmodified – Nikhilesh Reddy, Jinseong Jeon, Jeffrey A. Vaughan, Todd Millstein, Jeffrey S. Foster
Hey,You, GetOffofMy Market: DetectingMalicious Apps in Official and AlternativeAndroid Markets – Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang
Run-Time Enforcement of Information-Flow Properties – Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake
54 Run-time Principals in Information-flow Type Systems – Stephen Tse, Steve Zdancewic - 2004
42 Analyzing Inter-Application Communication in Android – Erika Chin, Adrienne Porter, Felt Kate, Greenwood David Wagner