Program analysis and specialization for the C programming language, 1994. ,
PScout, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.217-228, 2012. ,
DOI : 10.1145/2382196.2382222
A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010. ,
DOI : 10.1145/1866307.1866317
Automatically securing permission-based software by reducing the attack surface: an application to Android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, 2012. ,
DOI : 10.1145/2351676.2351722
URL : https://hal.archives-ouvertes.fr/hal-00700074
Xmandroid: A new android evolution to mitigate privilege escalation attacks, 2011. ,
Rolebased access control consistency validation, ISSTA 2006, pp.121-132 ,
DOI : 10.1145/1146238.1146253
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.473.1200
CRePE: Context-Related Policy Enforcement for Android, Proceedings of the 13th International Conference on Information security, 2011. ,
DOI : 10.1007/978-3-642-18178-8_29
Privilege Escalation Attacks on Android, Information Security, pp.346-360, 2011. ,
DOI : 10.1007/978-3-642-18178-8_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6200
Quire: Lightweight provenance for smart phone operating systems, 20th USENIX Security Symposium, 2011. ,
On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.235-245, 2009. ,
DOI : 10.1145/1653662.1653691
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.170.4433
Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, 2009. ,
DOI : 10.1109/MSP.2009.26
The effectiveness of application permissions, Proceedings of the 2nd USENIX conference on Web application development, pp.7-7, 2011. ,
Permission re-delegation: Attacks and defenses, Proceedings of the 20th USENIX Security Symposium, 2011. ,
Modular string-sensitive permission analysis with demanddriven precision, ICSE, pp.177-187, 2009. ,
Androidleaks detecting privacy leaks in android applications, 2011. ,
Zeus banking trojan variant attacks android smartphones. CRN, 2011. ,
Access rights analysis for Java, ACM SIGPLAN Notices, vol.37, issue.11, pp.359-372, 2002. ,
DOI : 10.1145/583854.582452
The Soot framework for Java program analysis: a retrospective, Cetus Users and Compiler Infastructure Workshop, 2011. ,
Scaling Java Points-to Analysis Using Spark, 12th International Conference on Compiler Construction, 2003. ,
DOI : 10.1007/3-540-36579-6_12
An Attack Surface Metric, IEEE Transactions on Software Engineering, vol.37, issue.3, pp.371-386, 2011. ,
DOI : 10.1109/TSE.2010.60
Application collusion attack on the permission-based security model and its implications for modern smartphone systems, 2011. ,
Understanding the implemented access control policy of Android system services with slicing and extended static checking, International Journal of Information Security, vol.10, issue.1, 2012. ,
DOI : 10.1007/s10207-014-0260-y
Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755732
Semantically rich application-centric security in android, Journal of Security and Communication Networks, 2011. ,
When Role Models Have Flaws: Static Validation of Enterprise Security Policies, 29th International Conference on Software Engineering (ICSE'07), 2007. ,
DOI : 10.1109/ICSE.2007.98
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection, ECOOP, 2005. ,
DOI : 10.1007/11531142_16
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems, 2012 IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/SP.2012.24
The protection of information in computer systems, Proceedings of the IEEE, 1975. ,
DOI : 10.1109/PROC.1975.9939
Google android: A state-of-the-art review of security mechanisms, 2009. ,
Depth-First Search and Linear Graph Algorithms, SIAM Journal on Computing, vol.1, issue.2, pp.146-160, 1972. ,
DOI : 10.1137/0201010
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.327.8418