Author of the publication

A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.

, , , and . Security and Management, page 323-329. CSREA Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the drop-box architecture for assisted living., , , and . FMSE, page 1-12. ACM, (2006)Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 235-247. Springer, (2006)Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages., , , , and . USENIX Security Symposium, USENIX Association, (2024)A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1215-1225 (2010)AMY: Use your cell phone to create a protected personal network over devices., , , and . IEEE Trans. Consumer Electron., 57 (1): 99-104 (2011)A Policy Language for the Extended Reference Monitor in Trusted Operating Systems., , , and . ARES, page 1160-1166. IEEE Computer Society, (2007)Extended Role Based Access Control and Procedural Restrictions., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 184-196. Springer, (2003)A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework., , , and . SocialCom/PASSAT, page 944-951. IEEE Computer Society, (2010)A Small But Non-negligible Flaw in the Android Permission Scheme., , , , and . POLICY, page 107-110. IEEE Computer Society, (2010)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 214-229. Springer, (2007)