Works (4)

Updated: April 11th, 2023 10:13

2019 article

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pp. 25–36.

By: S. Gorski, B. Andow, A. Nadkarni, S. Manandhar*, W. Enck, E. Bodden*, A. Bartel*

Source: Web Of Science
Added: July 1, 2019

2019 article

ARF: Identifying Re-Delegation Vulnerabilities in Android System Services

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 151–162.

By: S. Gorski & W. Enck

Source: Web Of Science
Added: August 19, 2019

2016 journal article

A Study of Security Isolation Techniques

ACM COMPUTING SURVEYS, 49(3).

By: R. Shu, P. Wang, S. Gorski, B. Andow, A. Nadkarni, L. Deshotels, J. Gionta n, W. Enck, X. Gu

author keywords: Security isolation; access control; resilient architectures
Source: Web Of Science
Added: August 6, 2018

2016 journal article

droid: Assessment and Evaluation of Android Application Analysis Tools

ACM COMPUTING SURVEYS, 49(3).

By: B. Reaves*, J. Bowers*, S. Gorski, O. Anise*, R. Bobhate*, R. Cho*, H. Das*, S. Hussain* ...

author keywords: Android; application security; program analysis
Source: Web Of Science
Added: August 6, 2018