Open Access
Issue
ITM Web Conf.
Volume 12, 2017
The 4th Annual International Conference on Information Technology and Applications (ITA 2017)
Article Number 04011
Number of page(s) 6
Section Session 4: Information Theory and Information Systems
DOI https://doi.org/10.1051/itmconf/20171204011
Published online 05 September 2017
  1. 360 root. http://root.360.cn/. [Google Scholar]
  2. Baidu root. http://root.baidu.com/. [Google Scholar]
  3. How to root any device. http://www.xdadevelopers.com/root/. [Google Scholar]
  4. Jorrit chainfire jongma. how-to su: Guidelines for problem-free su usage. http://su.chainfire.eu/, 2014. [Google Scholar]
  5. Transferring data using sync adapters. http://developer.android.com/training/syncadapters/index.html. [Google Scholar]
  6. A. A. Alariki and A. A. Manaf. Investigation of touchbased user authentication features using android smartphone. In Advanced Machine Learning Technologies and Applications - Second International Conference, AMLTA 2014, Cairo, Egypt, November 28-30, 2014. Proceedings, pages 135–144, 2014. [Google Scholar]
  7. ARM. Trustzone. http://www.arm.com/zh/products/processors/technologies/trustzone/. [Google Scholar]
  8. S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technische Universität Darmstadt, Technical Report TR-2011-04, 2011. [Google Scholar]
  9. J. G. Casanova, C. S. Ávila, G. Bailador, and A. de Santos Sierra. Authentication in mobile devices through hand gesture recognition. Int. J. Inf. Sec., 11(2):65–83, 2012. [CrossRef] [Google Scholar]
  10. T. Chang, C. Tsai, Y. Yang, and P. Cheng. User authentication using rhythm click characteristics for non-keyboard devices. In Proceedings of the 2011 International Conference on Asia Agriculture and Animal IPCBEE, volume 13, pages 167–171, 2011. [Google Scholar]
  11. W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst., 32(2):5:1–5:29, 2014. [CrossRef] [Google Scholar]
  12. W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst., 32(2):5:1–5:29, 2014. [CrossRef] [Google Scholar]
  13. M. C. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In 19th Annual Network and Distributed System Security Symposium (NDSS’12), San Diego, California, USA, Feb. 2012. [Google Scholar]
  14. L. Li, A. Bartel, T. F. Bissyandé, J. Klein, Y. L. Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, and P. McDaniel. Iccta: Detecting inter-component privacy leaks in android apps. In 37th IEEE/ACM International Conference on Software Engineering (ICSE’15), Florence, Italy, May. 2015, pages 280–291. [Google Scholar]
  15. F. Matenaar and P. Schulz. Detecting android sandboxes. http://www.dexlabs.org/blog/btdetect. [Google Scholar]
  16. Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers, pages 331–350, 2012. [Google Scholar]
  17. T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis. Rage against the virtual machine: hindering dynamic analysis of android malware. In Proceedings of the Seventh European Workshop on System Security, EuroSec 2014, April 13, 2014, Amsterdam, The Netherlands, pages 5:1–5:6, 2014. [Google Scholar]
  18. T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis. Rage against the virtual machine: hindering dynamic analysis of android malware. In Proceedings of the Seventh European Workshop on System Security, page 5. ACM, 2014. [Google Scholar]
  19. V. Rastogi, Y. Chen, and W. Enck. Apps playground: automatic security analysis of smartphone applications. In Third ACM Conference on Data and Application Security and Privacy, CODASPY’13, San Antonio, TX, USA, February 18-20, 2013, pages 209–220, 2013. [Google Scholar]
  20. N. Sae-Bae, K. Ahmed, K. Isbister, and N. D. Memon. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In CHI Conference on Human Factors in Computing Systems, CHI ‘12, Austin, TX, USA - May 05 - 10, 2012, pages 977–986, 2012. [EDP Sciences] [Google Scholar]
  21. T. Vidas and N. Christin. Evading android runtime analysis via sandbox detection. In 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ‘14, Kyoto, Japan - June 03 - 06, 2014, pages 447–458, 2014. [EDP Sciences] [Google Scholar]
  22. H. Zhang, D. She, and Z. Qian. Android root and its providers: A double-edged sword. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 1093–1104. ACM, 2015. [Google Scholar]
  23. Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 95–109. IEEE, 2012 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.