Separating Smartphone advertising from applications

作者: Shashi Shekhar

DOI:

关键词:

摘要:

参考文章(31)
Ari Juels, Targeted Advertising ... And Privacy Too the cryptographers track at the rsa conference. pp. 408- 424 ,(2001) , 10.1007/3-540-45353-9_30
Ari Juels, Markus Jakobsson, Sid Stamm, Combating click fraud via premium clicks usenix security symposium. pp. 2- ,(2007)
Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo, CRePE: context-related policy enforcement for android international conference on information security. ,vol. 6531, pp. 331- 345 ,(2010) , 10.1007/978-3-642-18178-8_29
Aaron Boodman, Adrienne Porter Felt, Prateek Saxena, Adam Barth, Protecting Browsers from Extension Vulnerabilities network and distributed system security symposium. ,(2010)
Alexander Moshchuk, Chris Grier, Helen J. Wang, Herman Venter, Piali Choudhury, Samuel T. King, The multi-principal OS construction of the gazelle web browser usenix security symposium. pp. 417- 432 ,(2009)
Helen J. Wang, Jon Howell, Xiaofeng Fan, Collin Jackson, MashupOS: operating system abstractions for client mashups HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems. pp. 16- ,(2007)
Alexander Moshchuk, Adrienne Porter Felt, Helen J. Wang, Erika Chin, Steven Hanna, Permission re-delegation: attacks and defenses usenix security symposium. pp. 22- 22 ,(2011)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Siahaan, Dries Vanoverberghe, Security-by-contract on the .NET platform Information Security Technical Report. ,vol. 13, pp. 25- 32 ,(2008) , 10.1016/J.ISTR.2008.02.001
Abhinav Pathak, Y. Charlie Hu, Ming Zhang, Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof european conference on computer systems. pp. 29- 42 ,(2012) , 10.1145/2168836.2168841