Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users

S Rosen, Z Qian, ZM Mao - Proceedings of the third ACM conference on …, 2013 - dl.acm.org
Although Android's permission system is intended to allow users to make informed decisions
about their privacy, it is often ineffective at conveying meaningful, useful information on how …

Performance evaluation on permission-based detection for android malware

CY Huang, YT Tsai, CH Hsu - … and Applications-Volume 2: Proceedings of …, 2013 - Springer
It is a straightforward idea to detect a harmful mobile application based on the permissions it
requests. This study attempts to explore the possibility of detecting malicious applications in …

Sok: Lessons learned from android security research for appified software platforms

Y Acar, M Backes, S Bugiel, S Fahl… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Android security and privacy research has boomed in recent years, far outstripping
investigations of other appified platforms. However, despite this attention, research efforts …

Security behaviors of smartphone users

A Das, HU Khan - Information & Computer Security, 2016 - emerald.com
Purpose–This paper aims to report on the information security behaviors of smartphone
users in an affluent economy of the Middle East. Design/methodology/approach–A model …

Upgrading your android, elevating my malware: Privilege escalation through mobile os updating

L Xing, X Pan, R Wang, K Yuan… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
Android is a fast evolving system, with new updates coming out one after another. These
updates often completely overhaul a running system, replacing and adding tens of …

L4Android: a generic operating system framework for secure smartphones

M Lange, S Liebergeld, A Lackorzynski… - Proceedings of the 1st …, 2011 - dl.acm.org
Smartphones became many people's primary means of communication. Emerging
applications such as Near Field Communication require new levels of security that cannot …

Automatically securing permission-based software by reducing the attack surface: An application to android

A Bartel, J Klein, Y Le Traon, M Monperrus - Proceedings of the 27th …, 2012 - dl.acm.org
In the permission-based security model (used eg in Android and Blackberry), applications
can be granted more permissions than they actually need, what we call a “permission gap” …

[引用][C] Android 安全研究进展

卿斯汉 - 软件学报, 2016

Android botnets: What urls are telling us

AF Abdul Kadir, N Stakhanova, AA Ghorbani - Network and System …, 2015 - Springer
Botnets have traditionally been seen as a threat to personal computers; however, the recent
shift to mobile platforms resulted in a wave of new botnets. Due to its popularity, Android …

Action recognition via local descriptors and holistic features

X Sun, M Chen, A Hauptmann - 2009 IEEE computer society …, 2009 - ieeexplore.ieee.org
In this paper we propose a unified action recognition framework fusing local descriptors and
holistic features. The motivation is that the local descriptors and holistic features emphasize …