KRATOS: DISCOVERING INCONSISTENT SECURITY POLICY ENFORCEMENT IN THE ANDROID FRAMEWORK

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (23. : 2016 : San Diego, Calif.) Network and Distributed System Security Symposium 2016 (NDSS '16) ; Volume 2 of 2
1. Verfasser: Shao, Yuru (VerfasserIn)
Weitere Verfasser: Chen, Qi Alfred (VerfasserIn), Mao, Z. Morley (VerfasserIn), Ott, Jason (VerfasserIn), Qian, Zhiyun (VerfasserIn)
Pages:2016
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
EFFICIENT PRIVATE STATISTICS WITH SUCCINCT SKETCHES 2020 Melis, Luca
DEPENDENCE MAKES YOU VULNERABLE: DIFFERENTIAL PRIVACY UNDER DEPENDENT TUPLES 2020 Liu, Changchang
LINKMIRAGE: ENABLING PRIVACY-PRESERVING ANALYTICS ON SOCIAL RELATIONSHIPS 2020 Liu, Changchang
MEASURING AND MITIGATING AS-LEVEL ADVERSARIES AGAINST TOR 2020 Nithyanand, Rishab
WEBSITE FINGERPRINTING AT INTERNET SCALE 2020 Panchenko, Andriy
WHEN A TREE FALLS: USING DIVERSITY IN ENSEMBLE CLASSIFIERS TO IDENTIFY EVASION IN MALWARE DETECTORS 2020 Smutz, Charles
FLEXDROID: ENFORCING IN-APP PRIVILEGE SEPARATION IN ANDROID 2020 Seo, Jaebaek
SKEE: A LIGHTWEIGHT SECURE KERNEL-LEVEL EXECUTION ENVIRONMENT FOR ARM 2020 Azab, Ahmed
DO YOU SEE WHAT ISEE? DIFFERENTIAL TREATMENT OF ANONYMOUS USERS 2020 Khattak, Sheharbano
EXTRACT ME IF YOU CAN: ABUSING PDF PARSERS IN MALWARE DETECTORS 2020 Carmony, Curtis
ENABLING CLIENT-SIDE CRASH-RESISTANCE TO OVERCOME DIVERSIFICATION AND INFORMATION HIDING 2020 Gawlik, Robert
GOING NATIVE: USING A LARGE-SCALE ANALYSIS OF ANDROID APPS TO CREATE A PRACTICAL NATIVE-CODE SANDBOXING POLICY 2020 Afonso, Vitor
LIFE AFTER APP UNINSTALLATION: ARE THE DATA STILL ALIVE? DATA RESIDUE ATTACKS ON ANDROID 2020 Zhang, Xiao
INTELLIDROID: A TARGETED INPUT GENERATOR FOR THE DYNAMIC ANALYSIS OF ANDROID MALWARE 2020 Wong, Michelle Y.
AUTOMATIC FORGERY OF CRYPTOGRAPHICALLY CONSISTENT MESSAGES TO IDENTIFY SECURITY VULNERABILITIES IN MOBILE SERVICES 2020 Zuo, Chaoshun
HARVESTING RUNTIME VALUES IN ANDROID APPLICATIONS THAT FEATURE ANTI-ANALYSIS TECHNIQUES 2020 Rasthofer, Siegfried
PITFALLS IN DESIGNING ZERO-EFFORT DEAUTHENTICATION: OPPORTUNISTIC HUMAN OBSERVATION ATTACKS 2020 Huhta, Otto
WHO’S IN CONTROL OF YOUR CONTROL SYSTEM? DEVICE FINGERPRINTING FOR CYBER-PHYSICAL SYSTEMS 2020 Formby, David
OPENSGX: AN OPEN PLATFORM FOR SGX RESEARCH 2020 Jain, Prerit
PRIVACY-PRESERVING SHORTEST PATH COMPUTATION 2020 Wu, David J.
Alle Artikel auflisten