App- Guard -Real-time policy enforcement for third-party applications, 2012. ,
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, 2011. ,
DroidChecker, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pp.125-136, 2012. ,
DOI : 10.1145/2185448.2185466
Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011. ,
DOI : 10.1145/1999995.2000018
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.2624
CRePE: Context-Related Policy Enforcement for Android, Proceedings of the 13th international conference on Information security, pp.331-345, 2011. ,
DOI : 10.1007/978-3-642-18178-8_29
I-arm-droid: A rewriting framework for in-app reference monitors for android applications ,
QUIRE: Lightweight Provenance for Smart Phone Operating Systems, p.2445, 2011. ,
On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.235-245, 2009. ,
DOI : 10.1145/1653662.1653691
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.170.4433
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011. ,
DOI : 10.1145/2046707.2046779
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160
Permission redelegation: attacks and defenses, Proceedings of the 20th USENIX conference on Security, pp.22-22, 2011. ,
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Proceedings of the 5th international conference on Trust and Trustworthy Computing, pp.291-307, 2012. ,
DOI : 10.1007/978-3-642-30921-2_17
Systematic Detection of Capability Leaks in Stock Android Smartphones, Proceedings of the 19th Network and Distributed System Security Symposium (NDSS), 2012. ,
Unsafe exposure analysis of mobile in-app advertisements, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pp.101-11212, 2012. ,
DOI : 10.1145/2185448.2185464
These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.639-652, 2011. ,
DOI : 10.1145/2046707.2046780
Don't kill my ads!, Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile '12, pp.1-2, 2012. ,
DOI : 10.1145/2162081.2162084
Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010. ,
DOI : 10.1145/1755688.1755732
Semantically Rich Application-Centric Security in Android, pp.340-349, 2009. ,
AdDroid, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, 2012. ,
DOI : 10.1145/2414456.2414498
AdSplit: separating smartphone advertising from applications, Proceedings of the 21st USENIX conference on Security symposium . pp. 28?28. Security'12, USENIX Association, 2012. ,
Investigating user privacy in android ad libraries ,
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012. ,
DOI : 10.1109/SP.2012.16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.368.3979