咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 9 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 3 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 11 篇 android applicat...
  • 5 篇 static analysis
  • 5 篇 dynamic analysis
  • 3 篇 data path tracin...
  • 3 篇 symbolic executi...
  • 2 篇 automated permis...
  • 2 篇 automatic analys...
  • 2 篇 machine learning
  • 2 篇 android permissi...
  • 2 篇 ui perception
  • 1 篇 software functio...
  • 1 篇 use case analysi...
  • 1 篇 bytecode monitor...
  • 1 篇 transaction anal...
  • 1 篇 java native inte...
  • 1 篇 software size me...
  • 1 篇 taint analysis
  • 1 篇 composite consta...
  • 1 篇 constant propaga...
  • 1 篇 effort estimatio...

机构

  • 2 篇 east china norma...
  • 2 篇 department of co...
  • 1 篇 univ southern ca...
  • 1 篇 singapore inst t...
  • 1 篇 southern polytec...
  • 1 篇 univ michigan an...
  • 1 篇 hong kong polyte...
  • 1 篇 school of comput...
  • 1 篇 samsung elect sa...
  • 1 篇 east china norma...
  • 1 篇 department of co...
  • 1 篇 georgia inst tec...
  • 1 篇 pace university
  • 1 篇 dept. of compute...
  • 1 篇 pace univ dept c...
  • 1 篇 arizona state un...
  • 1 篇 kennedaw state u...
  • 1 篇 zhejiang univ in...
  • 1 篇 department of el...
  • 1 篇 department of co...

作者

  • 3 篇 qian ying
  • 3 篇 qian kai
  • 2 篇 ying qian
  • 2 篇 bhattacharya pra...
  • 2 篇 kai qian
  • 2 篇 you wanqing
  • 2 篇 tao lixin
  • 2 篇 lixin tao
  • 1 篇 shar lwin khin
  • 1 篇 yan naing tun
  • 1 篇 mcdaniel patrick
  • 1 篇 prabir bhattacha...
  • 1 篇 chee wei leow
  • 1 篇 lingxiao jiang
  • 1 篇 chan alvin t. s.
  • 1 篇 tun yan naing
  • 1 篇 yi jeong hyun
  • 1 篇 minzhe guo
  • 1 篇 octeau damien
  • 1 篇 luchaup daniel

语言

  • 11 篇 英文
检索条件"主题词=Android application analysis"
11 条 记 录,以下是1-10 订阅
排序:
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for android Apps  7
Right to Know, Right to Refuse: Towards UI Perception-Based ...
收藏 引用
37th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Malviya, Vikas K. Leow, Chee Wei Kasthuri, Ashok Tun, Yan Naing Shar, Lwin Khin Jiang, Lingxiao Singapore Management Univ Sch Comp & Informat Syst Singapore Singapore
It is the basic right of a user to know how the permissions are used within the android app's scope and to refuse the app if granted permissions are used for the activities other than specified use which can amoun... 详细信息
来源: 评论
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for android Apps  22
Right to Know, Right to Refuse: Towards UI Perception-Based ...
收藏 引用
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering
作者: Vikas Kumar Malviya Chee Wei Leow Ashok Kasthuri Yan Naing Tun Lwin Khin Shar Lingxiao Jiang School of Computing and Information Systems Singapore Management University Singapore
It is the basic right of a user to know how the permissions are used within the android app’s scope and to refuse the app if granted permissions are used for the activities other than specified use which can amount t... 详细信息
来源: 评论
Effort estimation of open source android projects via transaction analysis
收藏 引用
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS 2021年 第1期33卷
作者: Qi, Kan Boehm, Barry Univ Southern Calif Ctr Syst & Software Engn Los Angeles CA 90007 USA
Transactions have been used in many software sizing methods to measure software functional size and provide a basis for effort estimation. To further investigate the effects that transactions have on software function... 详细信息
来源: 评论
NDroid: Toward Tracking Information Flows Across Multiple android Contexts
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2019年 第3期14卷 814-828页
作者: Xue, Lei Qian, Chenxiong Zhou, Hao Luo, Xiapu Zhou, Yajin Shao, Yuru Chan, Alvin T. S. Hong Kong Polytech Univ Dept Comp Hong Kong Hong Kong Peoples R China Georgia Inst Technol Sch Comp Sci Atlanta GA 30332 USA Zhejiang Univ Inst Cyber Secur Res Hangzhou 310027 Zhejiang Peoples R China Zhejiang Univ Coll Comp Sci & Technol Hangzhou 310027 Zhejiang Peoples R China Univ Michigan Ann Arbor MI 48109 USA Singapore Inst Technol Singapore 138683 Singapore
For performance and compatibility reasons, developers tend to use native code in their applications (or simply apps). This makes a bidirectional data flow through multiple contexts, i.e., the Java context and the nati... 详细信息
来源: 评论
Composite Constant Propagation and its application to android Program analysis
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2016年 第11期42卷 999-1014页
作者: Octeau, Damien Luchaup, Daniel Jha, Somesh McDaniel, Patrick Univ Wisconsin Dept Comp Sci 1210 W Dayton St Madison WI 53706 USA Penn State Univ Dept Comp Sci & Engn University Pk PA 16802 USA Carnegie Mellon Univ CyLab Pittsburgh PA 15213 USA
Many program analyses require statically inferring the possible values of composite types. However, current approaches either do not account for correlations between object fields or do so in an ad hoc manner. In this... 详细信息
来源: 评论
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated android applications
收藏 引用
IEEE ACCESS 2018年 6卷 71229-71240页
作者: Cho, Haehyun Yi, Jeong Hyun Ahn, Gail-Joon Arizona State Univ Ctr Cybersecur & Digital Forens Tempe AZ 85281 USA Soongsil Univ Cyber Secur Res Ctr Seoul 06978 South Korea Samsung Elect Samsung Res Seoul 06765 South Korea
Both android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed. These tools obfuscate sensitive strings and classes,... 详细信息
来源: 评论
A Hybrid analysis for Mobile Security Threat Detection  7
A Hybrid Analysis for Mobile Security Threat Detection
收藏 引用
7th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (IEEE UEMCON)
作者: Shi, Yong You, Wanqing Qian, Kai Bhattacharya, Prabir Qian, Ying Kennedaw State Univ Dept Comp Sci Kennesaw GA 30144 USA Morgan State Univ Dept Comp Sci Baltimore MD 21239 USA East China Normal Univ Dept Comp Sci Shanghai Peoples R China
with the rapid advancement of technology today, smartphones become more and more powerful and attract a huge amount of users with new features provided by mobile device operating systems such as android. However, due ... 详细信息
来源: 评论
Automated Detection and analysis for android Ransomware  17
Automated Detection and Analysis for Android Ransomware
收藏 引用
2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC)
作者: Yang, Tianda Yang, Yu Qian, Kai Lo, Dan Chia-Tien Qian, Ying Tao, Lixin Kennesaw State Univ Dept Comp Sci Marietta GA USA East China Normal Univ Dept Comp Sci Shanghai Peoples R China Pace Univ Dept Comp Sci New York NY 10038 USA
Along with the rapid growth of new science and technology, the functions of smartphones become more and more powerful. Nevertheless, everything has two aspects. Smartphones bring so much convenience for people and als... 详细信息
来源: 评论
POSTER: A hybrid approach for mobile security threat analysis  8
POSTER: A hybrid approach for mobile security threat analysi...
收藏 引用
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
作者: You, Wanqing Qian, Kai Guo, Minzhe Bhattacharya, Prabir Qian, Ying Tao, Lixin Department of Computer Science and Software Engineering Southern Polytechnic State University MariettaGA United States Department of Electrical Engineering and Computing Systems University of Cincinnati United States Department of Computer Science East China Normal University Shanghai China Dept. of Computer Science Pace University New York United States
Research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Static analysis and dynamic analysis constitute two of the most popular types of techn... 详细信息
来源: 评论
A hybrid approach for mobile security threat analysis  15
A hybrid approach for mobile security threat analysis
收藏 引用
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
作者: Wanqing You Kai Qian Minzhe Guo Prabir Bhattacharya Ying Qian Lixin Tao Southern Polytechnic State University Marietta GA University of Cincinnati East China Normal University Shanghai China Pace University New York
Research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Static analysis and dynamic analysis constitute two of the most popular types of techn... 详细信息
来源: 评论