Commit 9d024fc8 authored by Alessandra Gorla's avatar Alessandra Gorla
Browse files

added android ref from mobilesoft paper

parent 930234ae
......@@ -8,7 +8,7 @@
pages = {653--656},
doi = {10.1145/2889160.2889178},
publisher = {ACM},
}
}
@inproceedings{Stevens:2013:APU,
author = {Stevens, Ryan and Ganz, Jonathan and Filkov,
......@@ -18,7 +18,7 @@
crossref = "MSR2013",
pages = {31--40},
publisher = {IEEE Press},
}
}
@inproceedings{Rapoport:2017:WGC,
author = {Marianna Rapoport and Philippe Suter and Erik
......@@ -76,7 +76,7 @@
publisher = {IEEE Press},
keywords = {Android development, open-source dataset, software
engineering},
}
}
@inproceedings{Wei:2012:PEA,
author = {Wei, Xuetao and Gomez, Lorenzo and Neamtiu, Iulian
......@@ -87,7 +87,7 @@
pages = {31--40},
doi = {10.1145/2420950.2420956},
publisher = {ACM},
}
}
@inproceedings{Wei:2015:WDY,
author = {Xuetao Wei and Iulian Neamtiu and Michalis
......@@ -106,7 +106,7 @@
pages = {1--6},
doi = {10.1145/2614628.2614633},
publisher = {ACM},
}
}
@inproceedings{Ali-Gombe:2016:AAA,
author = {Ali-Gombe, Aisha and Ahmed, Irfan and Richard,III,
......@@ -118,7 +118,7 @@
doi = {10.1145/2857705.2857739},
publisher = {ACM},
keywords = {android, aspectj, dynamic analysis, instrumentation},
}
}
@inproceedings{Zhang:2016:ATG,
author = {Zhang, Hailong and Wu, Haowei and Rountev, Atanas},
......@@ -143,7 +143,7 @@
publisher = {ACM},
keywords = {android apps, google android, monitoring, profiling,
system},
}
}
@inproceedings{Burguera:2011:CBM,
author = {Burguera, Iker and Zurutuza, Urko and Nadjm-Tehrani,
......@@ -158,7 +158,7 @@
keywords = {anomaly detection, crowdsourcing, data mining,
dynamic analysis, intrusion detection, malware
detection, smartphone security},
}
}
@inproceedings{Wong:2016:ITI,
title = {IntelliDroid: A Targeted Input Generator for the
......@@ -269,7 +269,7 @@
publisher = {ACM},
keywords = {Android, Search-based software testing, Test
generation},
}
}
@inproceedings{Li:2017:LSP,
author = {Li, Menghao and Wang, Wei and Wang, Pei and Wang,
......@@ -304,7 +304,7 @@
publisher = {ACM},
keywords = {Software evolution, mobile applica- tions, mobile
software engineering},
}
}
@inproceedings{Grano:2017:AAU,
author = {Grano, Giovanni and Di Sorbo, Andrea and Mercaldo,
......@@ -332,7 +332,7 @@
doi = {10.1109/ASE.2015.46},
publisher = {IEEE Computer Society},
address = {Washington, DC, USA},
}
}
@inproceedings{Allix:2016:ACM,
author = {Allix, Kevin and Bissyand{\'e}, Tegawend{\'e} F. and
......@@ -404,4 +404,178 @@
keywords = {Android, Permissions, Soot, call-graph,
permission-based software, security, static
analysis},
}
}
@inproceedings{Gordon:Droidsafe:NDSS:2015,
author = "Gordon, Michael I. and Kim, Deokhwan and Perkins,
Jeff and Gilham, Limei and Nguyen, Nguyen and
Rinard, Martin",
title = "Information-Flow Analysis of {Android} Applications
in {DroidSafe}",
crossref = "NDSS2015",
}
@inproceedings{Huang:AsDroid:ICSE:2014,
author = {Huang, Jianjun and Zhang, Xiangyu and Tan, Lin and
Wang, Peng and Liang, Bin},
title = {{AsDroid:} Detecting Stealthy Behaviors in {Android}
Applications by User Interface and Program Behavior
Contradiction},
crossref = "ICSE2014",
isbn = {978-1-4503-2756-5},
pages = {1036--1046},
doi = {10.1145/2568225.2568301},
publisher = {ACM},
keywords = {Android, Program Behavior Contradiction, Stealthy
Behaviors, User Interface},
}
@inproceedings{Yang:gator:ICSE:2015,
author = {Yang, Shengqian and Yan, Dacong and Wu, Haowei and
Wang, Yan and Rountev, Atanas},
title = {Static Control-flow Analysis of User-driven
Callbacks in {Android} Applications},
crossref = "ICSE2015",
isbn = {978-1-4799-1934-5},
pages = {89--99},
publisher = {IEEE Press},
}
@inproceedings{AlSubaihin:appmining:Demobile:2015,
author = {Al-Subaihin, Afnan and Finkelstein, Anthony and
Harman, Mark and Jia, Yue and Martin, William and
Sarro, Federica and Zhang, Yuanyuan},
title = {App Store Mining and Analysis},
crossref = "DeMobile2015",
isbn = {978-1-4503-3815-8},
pages = {1--2},
doi = {10.1145/2804345.2804346},
keywords = {App stores, Mining Software Repositories},
}
@inproceedings{Au:pscout:CCS:2012,
author = {Au, Kathy Wain Yee and Zhou, Yi Fan and Huang, Zhen
and Lie, David},
title = {{PScout}: analyzing the {Android} permission
specification},
crossref = "CCS2012",
isbn = {978-1-4503-1651-4},
pages = {217--228},
doi = {10.1145/2382196.2382222},
keywords = {android, permissions, smartphone},
}
@inproceedings{Rasthofer:susi:NDSS:2014,
author = {Siegfried Rasthofer and Steven Arzt and Eric Bodden},
title = {A Machine-learning Approach for Classifying and
Categorizing {Android} Sources and Sinks},
year = {2014},
crossref = "NDSS2014",
}
@InProceedings{Huang:BidText:FSE:2016,
author = {Jianjun Huang and Xiangyu Zhang and Lin Tan},
title = {Detecting Sensitive Data Disclosure via
Bi-directional Text Correlation Analysis},
crossref = "FSE2016",
pages = {169--180},
}
@inproceedings{Wang:soundnessGUIAnalysisAndroid:SOAP:2016,
author = {Wang, Yan and Zhang, Hailong and Rountev, Atanas},
title = {On the Unsoundness of Static Analysis for {Android}
{GUIs}},
crossref = "SOAP2016",
isbn = {978-1-4503-4385-5},
pages = {18--23},
doi = {10.1145/2931021.2931026},
keywords = {Android, soundness, static analysis},
}
@inproceedings{Pandita:whyper:usenix:2013,
author = {Pandita, Rahul and Xiao, Xusheng and Yang, Wei and
Enck, William and Xie, Tao},
title = {WHYPER: Towards Automating Risk Assessment of Mobile
Applications},
crossref = "USENIXSec2013",
isbn = {978-1-931971-03-4},
pages = {527--542},
}
@inproceedings{Qu:autocog:CCS:2014,
author = {Qu, Zhengyang and Rastogi, Vaibhav and Zhang, Xinyi
and Chen, Yan and Zhu, Tiantian and Chen, Zhong},
title = {AutoCog: Measuring the Description-to-permission
Fidelity in Android Applications},
crossref = "CCS2014",
year = {2014},
isbn = {978-1-4503-2957-6},
pages = {1354--1365},
doi = {10.1145/2660267.2660287},
keywords = {android, google play, machine learning, mobile,
natural language processing, permissions},
}
@inproceedings{Yu:Descriptions:SANER:2016,
author = {L. Yu and X. Luo and C. Qian and S. Wang},
title = {Revisiting the Description-to-Behavior Fidelity in
Android Applications},
crossref = "SANER2016",
pages = {415--426},
doi = {10.1109/SANER.2016.67},
}
@InProceedings{Sarro:MiningDescrESEM:2016,
author = {A. A. Al-Subaihin and F. Sarro and S. Black and
L. Capra and M. Harman and Y. Jia and Y. Zhang},
title = {Clustering Mobile Apps Based on Mined Textual
Descriptions},
isbn = {978-1-4503-4427-2},
pages = {1--10},
crossref = "ESEM2016",
}
@inproceedings{Yang:appcontext:ICSE:2015,
author = {Yang, Wei and Xiao, Xusheng and Andow, Benjamin and
Li, Sihan and Xie, Tao and Enck, William},
title = {AppContext: Differentiating Malicious and Benign
Mobile App Behaviors Using Context},
crossref = "ICSE2015",
isbn = {978-1-4799-1934-5},
pages = {303--313},
publisher = {IEEE Press},
}
@inproceedings{Nan:uipicker:USENIXSEC:2015,
author = {Nan, Yuhong and Yang, Min and Yang, Zhemin and Zhou,
Shunfan and Gu, Guofei and Wang, XiaoFeng},
title = {UIPicker: User-input Privacy Identification in
Mobile Applications},
crossref = "USENIXSec2015",
isbn = {978-1-931971-232},
pages = {993--1008},
}
@inproceedings{Huang:SUPOR:USENIXSEC:2015,
author = {Huang, Jianjun and Li, Zhichun and Xiao, Xusheng and
Wu, Zhenyu and Lu, Kangjie and Zhang, Xiangyu and
Jiang, Guofei},
title = {{SUPOR}: Precise and Scalable Sensitive User Input
Detection for Android Apps},
crossref = "USENIXSec2015",
isbn = {978-1-931971-232},
pages = {977--992},
}
@techreport{Fuchs:scandroid:2009,
title = {Scandroid: Automated security certification of
android},
author = {Fuchs, Adam P and Chaudhuri, Avik and Foster,
Jeffrey S},
year = {2009},
institution = {Department of Computer Science, University of
Maryland, College Park},
number = {CS-TR-4991},
month = nov,
}
......@@ -1065,19 +1065,32 @@
}
@Proceedings{Defects2009,
title = "DEFECTS: Proceedings of the 2Nd International Workshop on Defects in Large Software Systems",
booktitle = "DEFECTS: Proceedings of the 2Nd International Workshop on Defects in Large Software Systems",
year = 2009,
address = "Chicago, IL, USA",
month = jul,
title = "DEFECTS: Proceedings of the 2Nd International
Workshop on Defects in Large Software Systems",
booktitle = "DEFECTS: Proceedings of the 2Nd International
Workshop on Defects in Large Software Systems",
year = 2009,
address = "Chicago, IL, USA",
month = jul,
}
@Proceedings{DeMobile2013,
title = "DeMobile 2013: 1st international Workshop on Software Development Lifecycle for Mobile",
booktitle = "DeMobile 2013: 1st international Workshop on Software Development Lifecycle for Mobile",
year = 2013,
address = "Saint Petersburg, Russia",
month = aug,
title = "DeMobile 2013: 1st international Workshop on
Software Development Lifecycle for Mobile",
booktitle = "DeMobile 2013: 1st international Workshop on
Software Development Lifecycle for Mobile",
year = 2013,
address = "Saint Petersburg, Russia",
month = aug,
}
@Proceedings{DeMobile2015,
title = "DeMobile 2015: 3rd international Workshop on
Software Development Lifecycle for Mobile",
booktitle = "DeMobile 2015: 3rd international Workshop on
Software Development Lifecycle for Mobile",
year = 2015,
address = "Bergamo, Italy",
month = aug,
}
@Proceedings{RDL2004,
......@@ -1363,6 +1376,13 @@
address = "Banff, Alberta, Canada",
month = sep,
}
@Proceedings{ESEM2016,
title = "ESEM 2016: Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement",
booktitle = "ESEM 2016: Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement",
year = 2016,
address = "Ciudad Real, Spain",
month = sep,
}
% Sources vary on whether the "on" and the "in" in the title of ESORICS
% should be capitalized; standard English usage would leave them
......@@ -2052,6 +2072,17 @@
address = "Edinburgh, UK",
month = jun,
}
@Proceedings{SOAP2016,
title = "SOAP 2016: Proceedings of the 5th ACM SIGPLAN
International Workshop on the State Of the Art in
Java Program Analysis ",
booktitle = "SOAP 2016: Proceedings of the 5th ACM SIGPLAN
International Workshop on the State Of the Art in
Java Program Analysis ",
year = 2016,
address = "Santa Barbara, CA, USA",
month = jun,
}
@Proceedings{HotMobile2011,
title = "HotMobile 2011: 12th Workshop on Mobile Computing Systems and Applications",
......@@ -3565,6 +3596,13 @@
address = "San Diego, CA, USA",
month = feb,
}
@Proceedings{NDSS2014,
title = "NDSS 2014: 20th Annual Symposium on Network and Distributed System Security",
booktitle = "NDSS 2014: 20th Annual Symposium on Network and Distributed System Security",
year = 2014,
address = "San Diego, CA, USA",
month = feb,
}
@Proceedings{NDSS2015,
title = "NDSS 2015: 21st Annual Symposium on Network and Distributed System Security",
booktitle = "NDSS 2015: 21st Annual Symposium on Network and Distributed System Security",
......@@ -5039,9 +5077,18 @@
title = "SANER 2015: 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering",
booktitle = "SANER 2015: 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering",
year = 2015,
address = Montreal,
address = "Montreal, Canada",
month = mar,
}
@Proceedings{SANER2016,
title = "SANER 2016: 23rd IEEE International Conference on
Software Analysis, Evolution, and Reengineering",
booktitle = "SANER 2016: 23rd IEEE International Conference on
Software Analysis, Evolution, and Reengineering",
year = 2016,
address = "Osaka, Japan",
month = mar,
}
@Proceedings{SAS95,
title = "SAS '95: Proceedings of the Second International Symposium on
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment