QUIRE: Lightweight Provenance for Smart Phone Operating Systems

by Michael Dietz , Shashi Shekhar , Dan S. Wallach , Yuliy Pisetsky , Anhei Shu
Citations:53 - 1 self

Active Bibliography

Helping Developers Construct Secure Mobile Applications – Erika Chin, Erika Michelle Chin, Erika Michelle Chin
46 Permission re-delegation: Attacks and defenses – Adrienne Porter Felt, Steven Hanna, Erika Chin, Helen J. Wang, Er Moshchuk - 2011
Flow Properties on Android – Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Jassim Aljuraidan, Lujo Bauer, Elli Fragkaki, Limin Jia, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake - 2012
16 AdSplit: Separating smartphone advertising from applications – Shashi Shekhar, Michael Dietz, Dan S. Wallach - 2012
55 Mostly-Static Decentralized Information Flow Control – Andrew C. Myers - 1999
22 Type-based distributed access control – Tom Chothia, Dominic Duggan - 2003
CMU-CyLab-11-020 – Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey, Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey - 2011
3 Modeling and Enhancing Android’s Permission System – Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
Hey,You, GetOffofMy Market: DetectingMalicious Apps in Official and AlternativeAndroid Markets – Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang
3 Dr. Android and Mr. Hide: Fine-grained security policies on unmodified – Jinseong Jeon, Nikhilesh Reddy, Jeffrey S. Foster, Kristopher K. Micinski, Yixin Zhu, Todd Millstein, Jeffrey A. Vaughan
5 Application-centric security policies on unmodified – Nikhilesh Reddy, Jinseong Jeon, Jeffrey A. Vaughan, Todd Millstein, Jeffrey S. Foster
1 AFrame: Isolating Advertisements from Mobile Applications in Android ∗ – Xiao Zhang, Amit Ahlawat, Wenliang Du
2 Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware – Sven Bugiel, Stephan Heuser, Ahmad-reza Sadeghi, Technische Universität Darmstadt - 2012
Run-Time Enforcement of Information-Flow Properties – Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake
Attacks on Android Clipboard – Xiao Zhang, Wenliang Du
Towards Comprehensible and Effective Permission Systems by – Adrienne Porter Felt, Adrienne Porter Felt, Adrienne Porter, Felt Abstract, Adrienne Porter Felt - 2012
18 Aurasium: Practical policy enforcement for android applications – Rubin Xu, Hassen Saïdi, Ross Anderson
Modeling Users ’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings – Jialiu Lin, Bin Liu, Norman Sadeh, Jason I. Hong
1 Reducing Attack Surfaces for Intra-Application Communication in Android – David Kantola, Erika Chin, Warren He, David Wagner