Sciweavers

58 search results - page 7 / 12
» Language-based security on Android
Sort
View
CCS
2010
ACM
14 years 12 months ago
Return-oriented programming without returns
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead make use of c...
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienk...
CSE
2009
IEEE
15 years 6 months ago
Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile Phones
An important tool for evaluating the health of patients who suffer from mobility-affecting chronic diseases such as MS, Parkinson’s, and Muscular Dystrophy is assessment of how ...
Jason Ryder, Brent Longstaff, Sasank Reddy, Debora...
POLICY
2007
Springer
15 years 5 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
IJISEC
2007
149views more  IJISEC 2007»
14 years 11 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
ACSAC
2010
IEEE
14 years 9 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou