Open Access
ITM Web Conf.
Volume 12, 2017
The 4th Annual International Conference on Information Technology and Applications (ITA 2017)
Article Number 05010
Number of page(s) 7
Section Session 5: Information Processing Methods and Techniques
Published online 05 September 2017
  1. Gartner. Gartner Says Five of Top 10 Worldwide Mobile Phone Vendors Increased Sales in Second Quarter of 2016[EB/OL]. [2017-01-12]. [Google Scholar]
  2. Chen H, Mao Y, Wang X, et al. Linux kernel vulnerabilities: State-of-the-art defenses and open problems[C]. Proceedings of the Second Asia-Pacific Workshop on Systems. ACM, 2011: 5. [Google Scholar]
  3. Vidas T, Zhang C, Christin N. Toward a general collection methodology for Android devices[J]. digital investigation, 2011, 8: S14–S24. [CrossRef] [Google Scholar]
  4. Smalley S, Craig R. Security Enhanced (SE) Android: Bringing Flexible MAC to Android[C]. NDSS. 2013, 310: 20–38. [Google Scholar]
  5. Drake J J, Lanier Z, Mulliner C, et al. Android hacker’s handbook[M]. John Wiley & Sons, 2014. [Google Scholar]
  6. Xu W, Fu Y. Own your android! yet another universal root[C]. 9th USENIX Workshop on Offensive Technologies (WOOT 15). 2015. [Google Scholar]
  7. Kanonov U, Wool A. Secure Containers in Android: the Samsung KNOX Case Study[J]. arXiv preprint arXiv:1605.08567, 2016. [Google Scholar]
  8. Davi L, Dmitrienko A, Sadeghi A R, et al. Privilege escalation attacks on android[C]. International Conference on Information Security. Springer Berlin Heidelberg, 2010: 346–360. [Google Scholar]
  9. Liebergeld S, Lange M. Android security, pitfalls and lessons learned[M]. Information Sciences and Systems 2013. Springer International Publishing, 2013: 409–417. [CrossRef] [Google Scholar]
  10. Jang W J, Cho S W, Lee H W, et al. Rooting attack detection method on the Android-based smart phone[C]. Computer Science and Network Technology (ICCSNT), 2011 International Conference on. IEEE, 2011, 1: 477–481. [Google Scholar]
  11. Wei T E, Tyan H R, Jeng A B, et al. DroidExec: Root exploit malware recognition against wide variability via folding redundant function-relation graph[C]. 2015 17th International Conference on Advanced Communication Technology (ICACT). IEEE, 2015: 161–169. [CrossRef] [Google Scholar]
  12. Ho T H, Dean D, Gu X, et al. PREC: practical root exploit containment for android devices[C]. Proceedings of the 4th ACM conference on Data and application security and privacy. ACM, 2014: 187–198. [Google Scholar]
  13. Park Y, Lee C, Lee C, et al. Rgbdroid: a novel response-based approach to android privilege escalation attacks[C]. Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, LEET. 2012, 12: 9–9. [Google Scholar]
  14. Park Y, Lee C, Kim J, et al. An Android security extension to protect personal information against illegal accesses and privilege escalation attacks[J]. Journal of Internet Services and Information Security (JISIS), 2012, 2(3/4): 29–42. [EDP Sciences] [Google Scholar]
  15. Lee C, Kim J, Cho S, et al. Unified security enhancement framework for the Android operating system[J]. The Journal of Supercomputing, 2014, 67(3): 738–756. [CrossRef] [Google Scholar]
  16. Wei L, Zuo Y, Ding Y, et al. Security Identifier Randomization: A Method to Prevent Kernel Privilege-Escalation Attacks[C]. 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2016: 838–842. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.