Taming Information-Stealing Smartphone Applications (on Android)
Top Cited Papers
- 1 January 2011
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- MockDroidPublished by Association for Computing Machinery (ACM) ,2011
- Exploring end user preferences for location obfuscation, location-based services, and the value of locationPublished by Association for Computing Machinery (ACM) ,2010
- ApexPublished by Association for Computing Machinery (ACM) ,2010
- Google Android: A Comprehensive Security AssessmentIEEE Security & Privacy, 2010
- Semantically Rich Application-Centric Security in AndroidPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- On lightweight mobile phone application certificationPublished by Association for Computing Machinery (ACM) ,2009
- Language-based security on AndroidPublished by Association for Computing Machinery (ACM) ,2009
- Understanding Android SecurityIEEE Security & Privacy, 2009
- Security-by-contract on the .NET platformInformation Security Technical Report, 2008