Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android
Tài liệu tham khảo
BlackBerry Enterprise Solution, 2009
Castrucci, 2008, Enhancing Java ME security support with resource usage monitoring, vol. 5308, 256
Conti, 2011, Crepe: context-related policy enforcement for android, 331
Desmet, 2008, Security-by-contract on the .NET platform, Information Security Technical Report, 13, 25, 10.1016/j.istr.2008.02.001
Enck, 2010, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, 1
Enck, 2009, Understanding android security, IEEE Security & Privacy Magazine, 7, 50, 10.1109/MSP.2009.26
Heath, 2006
Hornyack, 2011, These aren't the droids you're looking for: retrofitting android to protect data from imperious applications, 639
Nair S, Simpson P, Crispo B, Tanenbaum A. Trishul: a policy enforcement architecture for Java virtual machines. Technical Report. Amsterdam, Netherlands: Vrije Universiteit; 2008a.
Nair, 2008, Enforcing DRM policies across applications, 87
Nauman, 2010, Apex: extending android permission model and enforcement with user-defined runtime constraints, 328
Ongtang, 2010, Porscha: policy oriented secure content handling in android, 221
Philippaerts P. Security of software on mobile devices. Ph.D. thesis. Leuven, Belgium: Department of Computer Science, Faculty of Engineering; 2010.
Schreckling D, Posegga J, Hausknecht D. Constroid: data-centric access control for android. In: Proceedings of the 27th symposium on applied computing: computer security track; 2012a. p. 1478–1485.
Security overview. Technical Report. Cupertino, CA, USA: Apple Inc.; 2010.
Vandebogart, 2007, Labels and event processes in the asbestos operating system, ACM Transactions on Computer Systems (TOCS), 25, 10.1145/1314299.1314302
Windows phone 7 security model. Technical Report. Microsoft Corporation; 2010.
Yin, 2007, Panorama: capturing system-wide information flow for malware detection and analysis, 116