Formal Modeling and Reasoning about the Android Security Framework, 7th Intl Sym on Trustworthy Global Computing, 2012. ,
DOI : 10.1007/978-3-642-41157-1_5
A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10 ,
DOI : 10.1145/1866307.1866317
Secure Password Managers " and " Military-Grade Encryption " on Smartphones: Oh, Really?, 2012. ,
Web-based attacks on host-proof encrypted storage, 6th USENIX Workshop on Offensive Technologies (WOOT'12) ,
URL : https://hal.archives-ouvertes.fr/hal-00863383
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. ,
DOI : 10.1109/CSFW.2001.930138
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage, 2008 IEEE Symposium on Security and Privacy (sp 2008) ,
DOI : 10.1109/SP.2008.12
Recent Android app update prevents third-party apps from using com.google.android.gm.permission.READ GMAIL. Why? productforums. google.com, 2011. ,
DroidChecker, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12 ,
DOI : 10.1145/2185448.2185466
Language-based security on Android, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09 ,
DOI : 10.1145/1554339.1554341
Is this app safe? A large scale study on application permissions and risk signals, WWW '12 ,
CRePE: Context-Related Policy Enforcement for Android, 13th Intl Conf on Information Security (ISC '10) ,
DOI : 10.1007/978-3-642-18178-8_29
Privilege Escalation Attacks on Android, 13th Intl Conf on Information Security (ISC '10) ,
DOI : 10.1007/978-3-642-18178-8_30
Quire: Lightweight provenance for smart phone operating systems, 20th USENIX Conf on Security, 2011. ,
TaintDroid, 9th USENIX Conf on Operating Systems Design and Implementation (OSDI '10) ,
DOI : 10.1145/2619091
On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09 ,
DOI : 10.1145/1653662.1653691
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11 ,
DOI : 10.1145/2046707.2046779
Permission re-delegation: attacks and defenses, 20th USENIX Conf on Security ,
Modeling and Enhancing Android???s Permission System, ESORICS 2012 ,
DOI : 10.1007/978-3-642-33167-1_1
SCanDroid: Automated security certification of android applications, 2009. ,
Android 4.1 Compatibility Definition, p.7 ,
These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11 ,
DOI : 10.1145/2046707.2046780
Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10 ,
DOI : 10.1145/1755688.1755732
State of the appnation a year of change and growth in u.s. smartphones. blog.nielsen.com/ nielsenwire/online_mobile/state-of-the-appnation-\%E2\%80\ %93-a-year-of-change-and-growth-in-u-s-smartphones, p.16, 2012. ,
Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for??Android, 6th IFIP WG 11.2 Intl Conf on Inf Security Theory and Practice, p.12 ,
DOI : 10.1016/j.istr.2012.10.006
Adsplit: separating smartphone advertising from applications, 21st USENIX Conf on Security (SEC '12) ,
Investigating user privacy in android ad libraries Krishnaraj Varma's Blog, MoST 2012: Mobile Security Technologies. 28. K Varma. Security permissions in android. Accessed 9, 2010. ,
Aurasium: practical policy enforcement for android applications, 21st USENIX Conf on Security (SEC '12) ,