QUIRE: Lightweight Provenance for Smart Phone Operating Systems

by Michael Dietz , Shashi Shekhar , Dan S. Wallach , Yuliy Pisetsky , Anhei Shu
Citations:41 - 1 self

Documents Related by Co-Citation

183 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones – William Enck, Landon P. Cox, Jaeyeon Jung, et al. - 2010
60 These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications – P HORNYACK, S HAN, J JUNG, S SCHECHTER, D WETHERALL - 2011
85 Android permissions demystified – Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner
81 On Lightweight Mobile Phone Application Certification – William Enck, Machigar Ongtang, Patrick Mcdaniel - 2009
39 Permission re-delegation: Attacks and defenses – Adrienne Porter Felt, Steven Hanna, Erika Chin, Helen J. Wang, Er Moshchuk - 2011
75 A study of Android application security – William Enck, Damien Octeau, Patrick Mcdaniel, Swarat Chaudhuri - 2011
17 Towards taming privilege-escalation attacks on android – S Bugiel, L Davi, A Dmitrienko, T Fischer, A-R Sadeghi, B Shastry - 2012
56 Semantically Rich Application-Centric Security in Android – Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel - 2009
42 Analyzing Inter-Application Communication in Android – Erika Chin, Adrienne Porter, Felt Kate, Greenwood David Wagner
53 Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints – Mohammad Nauman, Sohail Khan, Xinwen Zhang
23 Unsafe Exposure Analysis of Mobile In-App Advertisements ABSTRACT – Michael Grace, Wu Zhou, Xuxian Jiang
45 PiOS: Detecting Privacy Leaks in iOS Applications – Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna
18 AdDroid: Privilege Separation for Applications and Advertisers in Android – Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David Wagner
27 Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones – R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, X Wang - 2011
31 A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android – David Barrera, P. C. Van Oorschot, H. Güne¸s Kayacık, Anil Somayaji
28 SCanDroid: Automated Security Certification of Android Applications – Adam P. Fuchs, Avik Chaudhuri, Jeffrey S. Foster
86 Robust Defenses for Cross-Site Request Forgery – Adam Barth, et al. - 2008
15 Crepe: Contextrelated policy enforcement for Android – M Conti, V T N Nguyen, B Crispo
19 Privilege escalation attacks on Android – Lucas Davi, Ra Dmitrienko, Ahmad-reza Sadeghi, Marcel Win