CONTEXTUAL POLICY ENFORCEMENT IN ANDROID APPLICATIONS WITH PERMISSION EVENT GRAPHS

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (20. : 2013 : San Diego, Calif.) Network and Distributed System Security Symposium 2013 (NDSS '13) ; Volume 1 of 2
1. Verfasser: Chen, Kevin (VerfasserIn)
Weitere Verfasser: Johnson, Noah (VerfasserIn), D'Silva, Vijay (VerfasserIn), Dai, Shuaifu (VerfasserIn), Macnamara, Kyle (VerfasserIn), Magrino, Tom (VerfasserIn), Wu, Edward (VerfasserIn), Rinard, Martin (VerfasserIn), Song, Dawn (VerfasserIn)
Pages:2013
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
HIGH ACCURACY ATTACK PROVENANCE VIA BINARY-BASED EXECUTION PARTITION 2020 Lee, Kyu Hyung
CAMP: CONTENT-AGNOSTIC MALWARE PROTECTION 2020 Provos, Niels
AUTHSCAN: AUTOMATIC EXTRACTION OF WEB AUTHENTICATION PROTOCOLS FROM IMPLEMENTATIONS 2020 Bai, Guangdong
ON IMPLEMENTING DENIABLE STORAGE ENCRYPTION FOR MOBILE DEVICES 2020 Skillen, Adam
I CAN BE YOU: QUESTIONING THE USE OF KEYSTROKE DYNAMICS AS BIOMETRICS 2020 Meng, Tey Chee
UNOBSERVABLE RE-AUTHENTICATION FOR SMARTPHONES 2020 Li, Lingjun
PLACERAIDER: VIRTUAL THEFT IN PHYSICAL SPACES WITH SMARTPHONES 2020 Templeman, Robert
SECURITY ENHANCED (SE) ANDROID: BRINGING FLEXIBLE MAC TO ANDROID 2020 Smalley, Stephen
THE CORE OF THE MATTER: ANALYZING MALICIOUS TRAFFIC IN CELLULAR CARRIERS 2020 Lever, Charles
ATTACK SURFACE METRICS AND AUTOMATED COMPILE-TIME OS KERNEL TAILORING 2020 Kurmus, A.
TAMING HOSTED HYPERVISORS WITH (MOSTLY) DEPRIVILEGED EXECUTION 2020 Wu, Chiachih
WHEN FIRMWARE MODIFICATIONS ATTACK: A CASE STUDY OF EMBEDDED EXPLOITATION 2020 Cui, Ang
PISCES: ANONYMOUS COMMUNICATION USING SOCIAL NETWORKS 2020 Mittal, Prateek
NEIGHBORWATCHER: A CONTENT-AGNOSTIC COMMENT SPAM INFERENCE SYSTEM 2020 Zhang, Jialong
INTEGUARD: TOWARD AUTOMATIC PROTECTION OF THIRD-PARTY WEB SERVICE INTEGRATIONS 2020 Xing, Luyi
PREVENTING SIDE-CHANNEL LEAKS IN WEB TRAFFIC: A FORMAL APPROACH 2020 Backes, Michael
THE POSTMAN ALWAYS RINGS TWICE: ATTACKING AND DEFENDING POSTMESSAGE IN HTML5 WEBSITES 2020 Son, Sooel
PRESERVING LINK PRIVACY IN SOCIAL NETWORK BASED SYSTEMS 2020 Mittal, Prateek
LAYING A SECURE FOUNDATION FOR MOBILE DEVICES 2020 Smalley, Stephen
A PRACTICAL, TARGETED, AND STEALTHY ATTACK AGAINST WPA ENTERPRISE 2020 Cassola, Aldo
Alle Artikel auflisten