• Publications
  • Influence
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
Today’s smartphone operating systems frequently fail to provide users with visibility into how third-party applications collect and share their private data. We address these shortcomings withExpand
  • 2,780
  • 287
  • PDF
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of applications results in aExpand
  • 948
  • 70
  • PDF
A Study of Android Application Security
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader securityExpand
  • 930
  • 41
  • PDF
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their privacy-sensitive data. We address theseExpand
  • 384
  • 27
WHYPER: Towards Automating Risk Assessment of Mobile Applications
Application markets such as Apple's App Store and Google's Play Store have played an important role in the popularity of smartphones and mobile devices. However, keeping malware out of applicationExpand
  • 297
  • 24
  • PDF
Understanding Android Security
Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secureExpand
  • 565
  • 23
  • PDF
AppsPlayground: automatic security analysis of smartphone applications
Today's smartphone application markets host an ever increasing number of applications. The sheer number of applications makes their review a daunting task. We propose AppsPlayground for Android, aExpand
  • 335
  • 23
  • PDF
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
Mobile malware attempts to evade detection during app analysis by mimicking security-sensitive behaviors of benign apps that provide similar functionality (e.g., sending SMS messages), andExpand
  • 193
  • 21
  • PDF
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities
Memory disclosure vulnerabilities have become a common component for enabling reliable exploitation of systems by leaking the contents of executable data. Previous research towards protectingExpand
  • 76
  • 18
  • PDF
ASM: A Programmable Interface for Extending Android Security
Android, iOS, and Windows 8 are changing the application architecture of consumer operating systems. These new architectures required OS designers to rethink security and access control. While theExpand
  • 96
  • 12
  • PDF