Tuesday 23 October 2012

References
[1] Android developer's guide. Available from: http://developer.android.com/
guide/index.html.

[2] Michael Backes, Sebastian Gerling, and Philipp von Styp-Rekowsky. A novel attack
against android phones. Available from: http://arxiv.org/abs/1106.4184.
[3] Avik Chaudhuri, Adam Fuchs, and Je rey Foster. SCanDroid: Automated security
certi cation of android applications. 2009.
[4] Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and Marcel Winandy.
Privilege escalation attacks on android. In Information Security: 13th International
Conference (ISC 2010), pages 346{360, 2010.
[5] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung,
Patrick McDaniel, and Anmol N. Sheth. Taintdroid: An information-
ow track-
ing system for realtime privacy monitoring on smartphones. In Proc. 9th USENIX
Symposium on Operating Systems Design and Implementation (OSDI 2010), pages
393{407, 2010.
[6] William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A study
of android application security. In Proc. 20th Usenix Security Symposium, 2011.
[7] William Enck, Machigar Ongtang, and Patrick Drew McDaniel. On lightweight
mobile phone application certi cation. In Proc. 16th ACM Conference on Computer
and Communication Security (CCS 2009), pages 235{245, 2009.
[8] Anthony Lineberry, David Luke Rechardson, and Tim Wyatt. These aren't the
permissions you're looking for. Available from: http://www.defcon.org/images/
defcon-18/dc-18-presentations/Lineberry/DEFCON-18-Lineberry-Not-The-
Permissions-You-Are-Looking-For.pdf.
[9] John Oberheide. How i almost won pwn2own via xss. Available from: http://jon.
oberheide.org/blog/2011/03/07/how-i-almost-won-pwn2own-via-xss/.
[10] John Oberheide. When angry birds attack: Android edition. Avail-
able from: http://jon.oberheide.org/blog/2011/05/28/when-angry-birds-
attack-android-edition/.

No comments:

Post a Comment