Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures), Proc. of the 27th IFIP International Information Security and Privacy Conference IFIP Advances in Information and Communication Technology, pp.13-24, 2012. ,
DOI : 10.1007/978-3-642-30436-1_2
Breaking and fixing the Android Launching Flow, Computers & Security, vol.39, 2013. ,
DOI : 10.1016/j.cose.2013.03.009
An Android Application Sandbox system for suspicious software detection, 2010 5th International Conference on Malicious and Unwanted Software, pp.55-62, 2010. ,
DOI : 10.1109/MALWARE.2010.5665792
Anatomy and physiology of an android, Google I/O, 2008. ,
Xmandroid: A new android evolution to mitigate privilege escalation attacks, 2011. ,
Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, 2011. ,
DOI : 10.1145/2046614.2046619
Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011. ,
DOI : 10.1145/1999995.2000018
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.2624
Privilege Escalation Attacks on Android, Information Security, pp.346-360, 2011. ,
DOI : 10.1007/978-3-642-18178-8_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6200
Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.50-57, 2009. ,
DOI : 10.1109/MSP.2009.26
Scandroid: Automated security certification of android applications, 2009. ,
Press Release, 2012. ,
Attacks on WebView in the Android system, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.343-352, 2011. ,
DOI : 10.1145/2076732.2076781
Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010. ,
DOI : 10.1145/1755688.1755732
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, Proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS), 2011. ,
Google Android: A Comprehensive Security Assessment, IEEE Security & Privacy Magazine, vol.8, issue.2, pp.35-44, 2010. ,
DOI : 10.1109/MSP.2010.2
Taming Information-Stealing Smartphone Applications (on Android), Proceedings of the 4th international conference on Trust and trustworthy computing, pp.93-107, 2011. ,
DOI : 10.1007/978-3-642-21599-5_7