Privacy Preserving Controls for Android Applications

作者: Narasimha Aditya Gollapudi

DOI:

关键词:

摘要:

参考文章(8)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen, Context-Aware Usage Control for Android international conference on security and privacy in communication systems. pp. 326- 343 ,(2010) , 10.1007/978-3-642-16161-2_19
Alexander Moshchuk, Adrienne Porter Felt, Helen J. Wang, Erika Chin, Steven Hanna, Permission re-delegation: attacks and defenses usenix security symposium. pp. 22- 22 ,(2011)
Wei Xu, Fangfang Zhang, Sencun Zhu, Permlyzer: Analyzing permission usage in Android applications international symposium on software reliability engineering. pp. 400- 410 ,(2013) , 10.1109/ISSRE.2013.6698893
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner, Android permissions: user attention, comprehension, and behavior symposium on usable privacy and security. pp. 3- ,(2012) , 10.1145/2335356.2335360
Mario Frank, Ben Dong, Adrienne Porter Felt, Dawn Song, Mining Permission Request Patterns from Android and Facebook Applications 2012 IEEE 12th International Conference on Data Mining. pp. 870- 875 ,(2012) , 10.1109/ICDM.2012.86
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Apex: extending Android permission model and enforcement with user-defined runtime constraints computer and communications security. pp. 328- 332 ,(2010) , 10.1145/1755688.1755732
Stephen A. Rago, W. Richard Stevens, Advanced Programming in the UNIX Environment, Second Edition Addison-Wesley Professional. ,(2008)