22.3.17

Ide Riset dan Pengembangan "Android Security"

https://www.xda-developers.com/google-launches-android-security-rewards-program/

Sumber: Bpk. Iwan Sumantri.
Beberapa Artikel berikut ini sangat cocok bagi Anda yang sedang mencari ide untuk Riset dan pengembangan "Android Security", atau sekedar belajar dan mengambil manfaat dari artikel2 hasil riset berikut ini :
  1. Analysis of Secure Key Storage Solutions on Android
    https://www.cs.ru.nl/E.Poll/papers/AndroidSecureStorage.pdf
  2. ATTACKING THE LINUX PRNG ON ANDROID
    https://www.usenix.org/…/conference/woot14/woot14-kaplan.pdf
  3. Android OEM's applications (in)security and backdoors without permission
    http://www.quarkslab.com/…/Android-OEM-applications-insecur…
  4. Attacks on Android Clipboard
    http://www.cis.syr.edu/…/pap…/clipboard_attack_dimva2014.pdf
  5. A Study of Android Application Security
    http://www.cs.rice.edu/%7Esc40/pubs/enck-sec11.pdf
  6. Attacks on Webview in the Android System
    http://www.cis.syr.edu/…/Resear…/paper/webview_acsac2011.pdf
  7. Gues who's is Texting you?Evaluating Security of Smartphone Messaging Applications
    https://www.sba-research.org/…/publicati…/ndss2012_final.pdf
  8. Evaluations of Security Solutions for Android Systems
    http://arxiv.org/ftp/arxiv/papers/1502/1502.04870.pdf
  9. Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security
    http://www2.dcsec.uni-hannover.de/files/android/p50-fahl.pdf
  10. The Impact of Vendor Customizations on Android Security
    https://www.cs.ncsu.edu/faculty/jiang/pubs/CCS13.pdf
  11. The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations
    http://www.cs.indiana.edu/%7Ezhou/files/sp14_zhou.pdf
  12. An Empirical Study of Cryptographic Misuse in Android Applications
    http://www.cs.ucsb.edu/%7Ec…/research/…/ccs13_cryptolint.pdf
  13. Android Permissions:User Attention, Comprehension, and Behavior
    http://www.guanotronic.com/%7Ese…/papers/soups12-android.pdf
  14. AppsPlayground: Automatic Security Analysis of Smartphone Applications
    http://www.cs.northwestern.edu/%7Eychen/…/AppsPlayground.pdf
  15. Understanding and Improving App Installation Security Mechanisms through Empirical Analysis of Android
    http://users.encs.concordia.ca/%7Eclark/papers/2012_spsm.pdf
  16. Android Malware Situation
    https://www.incibe.es/…/Estud…/android_malware_situation.pdf
  17. PowerSpy: Location Tracking using Mobile Device Power Analysis
    http://arxiv.org/pdf/1502.03182v2
  18. EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
    http://yinzhicao.org/EdgeMiner/2015_ndss_edgeminer.pdf
  19. Detecting Passive Content Leaks and Pollution in Android Applications
    http://www.yajin.org/papers/ndss13_contentscope.pdf
  20. DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform
    http://www.yajin.org/papers/codaspy14_divilar.pdf
  21. RiskRanker: Scalable and Accurate Zero-day Android Malware Detection
    http://www.csc.ncsu.edu/faculty/jiang/pubs/MOBISYS12.pdf
  22. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
    http://www.csc.ncsu.edu/faculty/jiang/pubs/CODASPY12.pdf
  23. Dissecting Android Malware: Characterization and Evolution
    http://www.yajin.org/papers/oakland12_sok.pdf
  24. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
    http://www.csc.ncsu.edu/facul…/…/pubs/NDSS12_DROIDRANGER.pdf
  25. Systematic Detection of Capability Leaks in Stock Android Smartphones
    http://www.csc.ncsu.edu/faculty/…/pubs/NDSS12_WOODPECKER.pdf
  26. Fast, Scalable Detection of “Piggybacked” Mobile Applications
    http://www.csc.ncsu.edu/faculty/jiang/pubs/CODASPY13.pdf
  27. Leaving our ZIP undone: how to abuse ZIP to deliver malware apps
    https://www.virusbtn.com/…/confe…/vb2014/VB2014-Panakkal.pdf
  28. Forensic Analysis On Android: A Practical Case
    https://www.sans.org/…/forensic-analysis-android-practical-…
  29. A Machine Learning Approach to Android Malware Detection
    http://www.utdallas.edu/~lkhan/papers/06298824.pdf
  30. Cross Site Scripting Attacks on Android Webview
    http://arxiv.org/ftp/arxiv/papers/1304/1304.7451.pdf
  31. Autonomous smartphone apps: self-compilation, mutation, and viral spreading
    http://arxiv.org/abs/1511.00444
  32. BareDroid: Large-Scale Analysis of Android Apps on Real Devices
    http://cs.ucsb.edu/~y…/publications/2015_acsac_baredroid.pdf 
 Silahkan dishare dan semoga bermanfaat.
Share:

0 comments :

Post a Comment

Mari komentar dan berdiskusi...