-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathoro-cs-seminar.bib
515 lines (475 loc) · 23 KB
/
oro-cs-seminar.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
% Encoding: UTF-8
@InProceedings{Abro2017,
author = {Abro, Fauzia Idrees and Rajarajan, Muttukrishnan and Chen, Thomas M. and Rahulamathavan, Yogachandran},
title = {{Android} application collusion demystified},
booktitle = {Future Network Systems and Security},
year = {2017},
editor = {Doss, Robin and Piramuthu, Selwyn and Zhou, Wei},
pages = {176--187},
address = {Cham},
publisher = {Springer International Publishing},
abstract = {Application collusion is an emerging threat to Android based devices. In app collusion, two or more apps collude in some manner to perform a malicious action that they are unable to do independently. Detection of colluding apps is a challenging task. Existing commercial malware detection systems analyse each app separately, hence fail to detect any joint malicious action performed by multiple apps through collusion. In this paper, we discuss the current state of research on app collusion and open challenges to the detection of colluding apps. We compare existing approaches and present an integrated approach to effectively detect app collusion.},
doi = {10.1007/978-3-319-65548-2\_14},
file = {:Abro2017 - Android Application Collusion Demystified.pdf:PDF},
isbn = {978-3-319-65548-2},
owner = {Ervin Oro},
timestamp = {22-03-2019},
url = {http://openaccess.city.ac.uk/18503/},
}
@Article{Al-Haiqi2014,
author = {Ahmed Al-Haiqi and Mahamod Ismail and Rosdiadee Nordin},
title = {A new sensors-based covert channel on {Android}},
journal = {The Scientific World Journal},
year = {2014},
volume = {2014},
pages = {1--14},
comment = {vibra - acc covert channel},
doi = {10.1155/2014/969628},
file = {:Al-Haiqi2014 - A New Sensors Based Covert Channel on Android.pdf:PDF},
owner = {Ervin Oro},
publisher = {Hindawi Limited},
timestamp = {21-03-2019},
url = {https://www.hindawi.com/journals/tswj/2014/969628/abs/},
}
@Article{Asavoae2016,
author = {Irina Mariuca Asavoae and Jorge Blasco and Thomas M. Chen and Harsha Kumara Kalutarage and Igor Muttik and Hoang Nga Nguyen and Markus Roggenbach and Siraj Ahmed Shaikh},
title = {Towards automated {Android} app collusion detection},
journal = {{arXiv} preprint \href{https://arxiv.org/abs/1603.02308}{{arXiv}:1603.02308}},
year = {2016},
abstract = {Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we provide a concise definition of collusion and report on a number of automated detection approaches, developed in co-operation with Intel Security.},
comment = {definition, filtering, ai, model},
date = {2016-03-07},
eprint = {http://arxiv.org/abs/1603.02308v1},
eprintclass = {cs.SE},
eprinttype = {arXiv},
file = {:Asavoae2016 - Towards Automated Android App Collusion Detection.pdf:PDF},
owner = {Ervin Oro},
timestamp = {21-03-2019},
url = {https://arxiv.org/abs/1603.02308},
}
@InCollection{Asavoae2017,
author = {Irina M{\u{a}}riuca As{\u{a}}voae and Jorge Blasco and Thomas M. Chen and Harsha Kumara Kalutarage and Igor Muttik and Hoang Nga Nguyen and Markus Roggenbach and Siraj Ahmed Shaikh},
title = {Detecting malicious collusion between mobile software applications: the {Android\textsuperscript{TM}} case},
booktitle = {Data Analytics and Decision Support for Cybersecurity},
publisher = {Springer International Publishing},
year = {2017},
pages = {55--97},
month = aug,
comment = {definition},
doi = {10.1007/978-3-319-59439-2\_3},
file = {:Asavoae2017 - Detecting Malicious Collusion between Mobile Software Applications_ the Android^TM Case.pdf:PDF},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@InProceedings{Asavoae2018,
author = {As{\u{a}}voae, Irina M{\u{a}}riuca and Nguyen, Hoang Nga and Roggenbach, Markus},
title = {Software model checking for mobile security -- collusion detection in {$\mathbb{K}$}},
booktitle = {Model Checking Software},
year = {2018},
editor = {Gallardo, Mar{\'i}a del Mar and Merino, Pedro},
pages = {3--25},
address = {Cham},
publisher = {Springer International Publishing},
abstract = {Mobile devices pose a particular security risk because they hold personal details and have capabilities potentially exploitable for eavesdropping. The Android operating system is designed with a number of built-in security features such as application sandboxing and permission-based access control. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps whose combined permissions allow them to carry out attacks that neither app is able to execute by itself. In this paper, we develop a software model-checking approach within the {\$}{\$}{\backslash}mathbb {\{}K{\}}{\$}{\$}Kframework that is capable to detect collusion. This involves giving an abstract, formal semantics to Android applications and proving that the applied abstraction principles lead to a finite state space.},
comment = {collusion potential ignoring intent},
doi = {10.1007/978-3-319-94111-0\_1},
file = {:Asavoae2018 - Software Model Checking for Mobile Security – Collusion Detection in K.pdf:PDF},
isbn = {978-3-319-94111-0},
owner = {Ervin Oro},
timestamp = {21-03-2019},
url = {https://link.springer.com/chapter/10.1007/978-3-319-94111-0_1},
}
@Electronic{AWSLLC2018,
author = {{Awio Web Services LLC}},
month = dec,
year = {2018},
title = {Browser \& platform market share},
url = {https://www.w3counter.com/globalstats.php?year=2018&month=12},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Article{Bhandari2017,
author = {Shweta Bhandari and Wafa Ben Jaballah and Vineeta Jain and Vijay Laxmi and Akka Zemmari and Manoj Singh Gaur and Mohamed Mosbah and Mauro Conti},
title = {Android inter-app communication threats and detection techniques},
journal = {Computers \& Security},
year = {2017},
volume = {70},
pages = {392 - 421},
issn = {0167-4048},
doi = {10.1016/j.cose.2017.07.002},
file = {:Bhandari2017 - Android Inter App Communication Threats and Detection Techniques.pdf:PDF},
keywords = {App collusion, Privacy leakage, Inter component communication, Inter-app communication, Multi-app analysis},
owner = {Ervin Oro},
timestamp = {22-03-2019},
url = {http://www.sciencedirect.com/science/article/pii/S0167404817301414},
}
@InProceedings{Blasco2016,
author = {Blasco, Jorge and Roggenbach, Markus and Chen, Thomas and Muttik, Igor},
title = {Wild {Android} collusions},
booktitle = {VB2016},
year = {2016},
month = oct,
comment = {MoPlus SDK},
file = {:Blasco2016 - Wild Android Collusions.pdf:PDF},
owner = {Ervin Oro},
timestamp = {29-01-2019},
url = {https://www.virusbulletin.com/conference/vb2016/abstracts/wild-android-collusions},
}
@InProceedings{Chen2018,
author = {Chen, Hongyi and Su, Jinshu and Qiao, Linbo and Zhang, Yi and Xin, Qin},
title = {Malware collusion attack against machine learning based methods: issues and countermeasures},
booktitle = {Cloud Computing and Security},
year = {2018},
editor = {Sun, Xingming and Pan, Zhaoqing and Bertino, Elisa},
pages = {465--477},
address = {Cham},
publisher = {Springer International Publishing},
abstract = {Android has become the most popular platform for mobile devices, and also it has become a popular target for malware developers. At the same time, researchers have proposed a large number of methods, both static and dynamic analysis methods, to fight against malwares. Among these, Machine learning based methods are quite effective in Android malware detection, the accuracy of which can be up to 98{\%}. Thus, malware developers have the incentives to develop more advanced malwares to evade detection. This paper presents an adversary attack pattern that will compromise current machine learning based malware detection methods. The malware developers can perform this attack easily by splitting malicious payload into two or more apps. The split apps will all be classified as benign by current methods. Thus, we proposed a method to deal with this issue. This approach, realized in a tool, called ColluDroid, can identify the collusion apps by analyzing the communication between apps. The evaluation results show that ColluDroid is effective in finding out the collusion apps. Also, we showed that it's easy to split an app to evade detection. According to our split simulation, the evasion rate is 78{\%}, when split into two apps; while the evasion rate comes to 94.8{\%}, when split into three apps.},
doi = {10.1007/978-3-030-00018-9\_41},
file = {:Chen2018 - Malware Collusion Attack against Machine Learning Based Methods_ Issues and Countermeasures.pdf:PDF},
isbn = {978-3-030-00018-9},
owner = {Ervin Oro},
timestamp = {21-03-2019},
url = {https://link.springer.com/chapter/10.1007/978-3-030-00018-9_41},
}
@InCollection{Davidson2018,
author = {Drew Davidson and Vaibhav Rastogi and Mihai Christodorescu and Somesh Jha},
title = {Enhancing {Android} security through app splitting},
booktitle = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
publisher = {Springer International Publishing},
year = {2018},
pages = {24--44},
doi = {10.1007/978-3-319-78813-5\_2},
file = {:Davidson2018 - Enhancing Android Security through App Splitting.pdf:PDF},
owner = {Ervin Oro},
timestamp = {22-03-2019},
}
@InProceedings{Deshotels2016,
author = {Luke Deshotels and Razvan Deaconescu and Mihai Chiroiu and Lucas Davi and William Enck and Ahmad-Reza Sadeghi},
title = {{SandScout}},
booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security - {CCS}{\textquotesingle}16},
year = {2016},
publisher = {{ACM} Press},
comment = {iOS app collusion},
doi = {10.1145/2976749.2978336},
file = {:Deshotels2016 - SandScout.pdf:PDF},
owner = {Ervin Oro},
timestamp = {18-02-2019},
url = {https://dl.acm.org/citation.cfm?id=2978336},
}
@Electronic{Edge2016,
author = {Jake Edge},
month = aug,
year = {2016},
title = {Hardened usercopy},
url = {https://lwn.net/Articles/695991/},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Article{Elish2018,
author = {K. Elish and H. Cai and D. Barton and D. Yao and B. Ryder},
title = {Identifying mobile inter-app communication risks},
journal = {IEEE Transactions on Mobile Computing},
year = {2018},
issn = {1558-0660},
comment = {Intent flow analysis},
doi = {10.1109/TMC.2018.2889495},
file = {:Elish2018 - Identifying Mobile Inter App Communication Risks.pdf:PDF},
keywords = {Security;Malware;Feature extraction;Mobile computing;Sensitivity;Complexity theory;Standards;Android ICC;inter-app analysis;malware collusion;static analysis;risk assessment},
owner = {Ervin Oro},
timestamp = {12-03-2019},
url = {https://ieeexplore.ieee.org/document/8587187},
}
@Article{Enck2014,
author = {Enck, William and Gilbert, Peter and Han, Seungyeop and Tendulkar, Vasant and Chun, Byung-Gon and Cox, Landon P. and Jung, Jaeyeon and McDaniel, Patrick and Sheth, Anmol N.},
title = {{TaintDroid}: an information-flow tracking system for realtime privacy monitoring on smartphones},
journal = {ACM Transactions on Computer Systems (TOCS)},
year = {2014},
volume = {32},
number = {2},
pages = {5:1--5:29},
month = jun,
issn = {0734-2071},
acmid = {2619091},
address = {New York, NY, USA},
articleno = {5},
doi = {10.1145/2619091},
file = {:Enck2014 - TaintDroid_ an Information Flow Tracking System for Realtime Privacy Monitoring on Smartphones.pdf:PDF},
issue_date = {June 2014},
keywords = {Information-flow tracking, mobile apps, privacy monitoring, smartphones},
numpages = {29},
owner = {Ervin Oro},
publisher = {ACM},
timestamp = {21-03-2019},
url = {http://doi.acm.org/10.1145/2619091},
}
@Booklet{AVTESTGH2018,
title = {Security report 2017/18},
author = {{AV-TEST GmbH}},
month = jul,
year = {2018},
file = {:AVTESTGH2018 - Security Report 2017_18.pdf:PDF},
owner = {Ervin Oro},
timestamp = {30-01-2019},
url = {https://www.av-test.org/en/news/the-av-test-security-report-20172018-the-latest-analysis-of-the-it-threat-scenario/},
}
@Misc{Google2017,
author = {{Google, Inc.}},
title = {The {Google Android Security Team}’s classifications for potentially harmful applications},
month = feb,
year = {2017},
file = {:Google2017 - The Google Android Security Team’s Classifications for Potentially Harmful Applications.pdf:PDF},
owner = {Ervin Oro},
timestamp = {20-01-2019},
url = {https://source.android.com/security/reports/Google_Android_Security_PHA_classifications.pdf},
}
@Article{Hardy1988,
author = {Hardy, Norm},
title = {The confused deputy: (or why capabilities might have been invented)},
journal = {SIGOPS Oper. Syst. Rev.},
year = {1988},
volume = {22},
number = {4},
pages = {36--38},
month = oct,
issn = {0163-5980},
acmid = {871709},
address = {New York, NY, USA},
doi = {10.1145/54289.871709},
file = {:Hardy1988 - The Confused Deputy_ (or Why Capabilities Might Have Been Invented).pdf:PDF},
issue_date = {Oct. 1988},
numpages = {3},
owner = {Ervin Oro},
publisher = {ACM},
timestamp = {22-03-2019},
url = {http://doi.acm.org/10.1145/54289.871709},
}
@Electronic{Lawrence2017,
author = {Paul Lawrence},
month = jul,
year = {2017},
title = {Seccomp filter in {Android O}},
url = {https://android-developers.googleblog.com/2017/07/seccomp-filter-in-android-o.html},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@InProceedings{Marforio2012,
author = {Claudio Marforio and Hubert Ritzdorf and Aur{\'{e}}lien Francillon and Srdjan Capkun},
title = {Analysis of the communication between colluding applications on modern smartphones},
booktitle = {Proceedings of the 28th Annual Computer Security Applications Conference on - {ACSAC} {\textquotesingle}12},
year = {2012},
publisher = {{ACM} Press},
comment = {many overt and covert channels},
doi = {10.1145/2420950.2420958},
file = {:Marforio2012 - Analysis of the Communication between Colluding Applications on Modern Smartphones.pdf:PDF},
owner = {Ervin Oro},
timestamp = {20-02-2019},
url = {https://dl.acm.org/citation.cfm?id=2420958},
}
@Booklet{McAfee2016,
title = {Safeguarding against colluding mobile apps},
author = {{McAfee}},
month = may,
year = {2016},
comment = {claims perfect solution against collusion},
file = {:McAfee2016 - Safeguarding against Colluding Mobile Apps.pdf:PDF},
owner = {Ervin Oro},
timestamp = {21-03-2019},
url = {https://www.mcafee.com/enterprise/en-us/assets/solution-briefs/sb-quarterly-threats-may-2016-1.pdf},
}
@Booklet{McAfee2018,
title = {Mobile threat report},
author = {{McAfee}},
month = apr,
year = {2018},
owner = {Ervin Oro},
timestamp = {30-01-2019},
}
@InCollection{Muttik2016,
author = {Muttik, Igor},
title = {Partners in crime: investigating mobile app collusion},
booktitle = {{McAfee Labs} threats report},
publisher = {{McAfee}},
year = {2016},
pages = {8--15},
month = jun,
comment = {additional manual & heuristical cues for detection
},
file = {:Muttik2016 - Partners in Crime_ Investigating Mobile App Collusion.pdf:PDF},
owner = {Ervin Oro},
timestamp = {31-01-2019},
url = {https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-may-2016.pdf},
}
@Electronic{nn2017,
author = {{[email protected]}},
month = mar,
year = {2017},
title = {Android {O} prevents access to /proc/stat},
url = {https://issuetracker.google.com/issues/37140047},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Electronic{AOSPdeveloper,
author = {{Android Open Source Project}},
year = {2019},
title = {{Android} developers},
url = {https://developer.android.com/},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Electronic{AOSPplayprotect,
author = {{Android Open Source Project}},
year = {2019},
title = {{Google} {Play} {Protect}: securing 2 billion users daily},
url = {https://www.android.com/play-protect/},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Electronic{AOSPsecurity,
author = {{Android Open Source Project}},
year = {2019},
title = {Security},
url = {https://source.android.com/security},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Electronic{AOSP,
author = {{Android Open Source Project}},
year = {2019},
title = {The {Android} source code},
url = {https://source.android.com/setup},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Misc{AOSP2018,
author = {{Android Open Source Project} and others},
title = {{Android} security 2017 year in review},
month = mar,
year = {2018},
comment = {play protect against collusion?},
file = {:AOSP2018 - Android Security 2017 Year in Review.pdf:PDF},
owner = {Ervin Oro},
timestamp = {21-03-2019},
url = {https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf},
}
@Article{Qi2018,
author = {Wen Qi and Wanfu Ding and Xinyu Wang and Yonghang Jiang and Yichen Xu and Jianping Wang and Kejie Lu},
title = {Construction and mitigation of user-behavior-based covert channels on smartphones},
journal = {{IEEE} Transactions on Mobile Computing},
year = {2018},
volume = {17},
number = {1},
pages = {44--57},
month = {jan},
comment = {TODO covert channel
},
doi = {10.1109/tmc.2017.2696945},
file = {:Qi2018 - Construction and Mitigation of User Behavior Based Covert Channels on Smartphones.pdf:PDF},
owner = {Ervin Oro},
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
timestamp = {20-02-2019},
url = {https://ieeexplore.ieee.org/abstract/document/7908988},
}
@InProceedings{Qiu2018,
author = {Lina Qiu and Yingying Wang and Julia Rubin},
title = {Analyzing the analyzers: {FlowDroid}/{IccTA}, {AmanDroid}, and {DroidSafe}},
booktitle = {Proceedings of the 27th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis - {ISSTA} 2018},
year = {2018},
publisher = {{ACM} Press},
doi = {10.1145/3213846.3213873},
file = {:Qiu2018 - Analyzing the Analyzers_ FlowDroid_IccTA, AmanDroid, and DroidSafe.pdf:PDF},
owner = {Ervin Oro},
timestamp = {27-01-2019},
}
@InProceedings{Schlegel2011,
author = {Roman Schlegel and Kehuan Zhang and Xiao{-}yong Zhou and Mehool Intwala and Apu Kapadia and XiaoFeng Wang},
title = {Soundcomber: {A} stealthy and context-aware sound trojan for smartphones},
booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS}{\textquotesingle}2011},
year = {2011},
month = jan,
comment = {artificial collusion example; 4.2.2: covert channels: vibration settings, volume settings, the handset screen, and file locks},
file = {:Schlegel2011 - Soundcomber_ a Stealthy and Context Aware Sound Trojan for Smartphones.pdf:PDF},
owner = {Ervin Oro},
timestamp = {20-02-2019},
url = {https://www.researchgate.net/publication/221655538_Soundcomber_A_Stealthy_and_Context-Aware_Sound_Trojan_for_Smartphones},
}
@Electronic{StatCounter2018,
author = {{StatCounter}},
month = dec,
year = {2018},
title = {Operating system market share worldwide},
url = {http://gs.statcounter.com/os-market-share},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Electronic{Statista2018,
author = {{Statista}},
month = dec,
year = {2018},
title = {Number of available applications in the {Google Play Store} from {December} 2009 to {December} 2018},
url = {https://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-play-store/},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@Article{Wei2018,
author = {Fengguo Wei and Sankardas Roy and Xinming Ou and Robby},
title = {{Amandroid}: {A} precise and general inter-component data flow analysis framework for security vetting of {Android} apps},
journal = {{ACM} Transactions on Privacy and Security},
year = {2018},
volume = {21},
number = {3},
pages = {1--32},
month = {apr},
doi = {10.1145/3183575},
file = {:Wei2018 - Amandroid.pdf:PDF},
owner = {Ervin Oro},
publisher = {Association for Computing Machinery ({ACM})},
timestamp = {27-01-2019},
}
@Electronic{Willden2017,
author = {Shawn Willden},
month = sep,
year = {2017},
title = {Keystore key attestation},
url = {https://android-developers.googleblog.com/2017/09/keystore-key-attestation.html},
owner = {Ervin Oro},
timestamp = {21-03-2019},
}
@InProceedings{Xu2017,
author = {Mengwei Xu and Yun Ma and Xuanzhe Liu and Felix Xiaozhu Lin and Yunxin Liu},
title = {{AppHolmes}: detecting and characterizing app collusion among third-party {Android} markets},
booktitle = {Proceedings of the 26th International Conference on World Wide Web - {WWW} {\textquotesingle}17},
year = {2017},
publisher = {{ACM} Press},
comment = {alternative definition},
doi = {10.1145/3038912.3052645},
file = {:Xu2017 - AppHolmes.pdf:PDF},
owner = {Ervin Oro},
timestamp = {12-03-2019},
url = {https://ieeexplore.ieee.org/abstract/document/7349085/},
}
@InCollection{Zhan2017,
author = {Jiawei Zhan and Quan Zhou and Xiaozhuo Gu and Yuewu Wang and Yingjiao Niu},
title = {Splitting third-party libraries' privileges from {Android} apps},
booktitle = {Information Security and Privacy},
publisher = {Springer International Publishing},
year = {2017},
pages = {80--94},
month = may,
doi = {10.1007/978-3-319-59870-3\_5},
file = {:Zhan2017 - Splitting Third Party Libraries' Privileges from Android Apps.pdf:PDF},
owner = {Ervin Oro},
timestamp = {22-03-2019},
}
@InCollection{OEDcollusion,
title = {collusion, n.},
booktitle = {OED Online},
publisher = {Oxford University Press},
year = {2018},
month = dec,
owner = {Ervin Oro},
timestamp = {28-01-2019},
url = {http://www.oed.com/view/Entry/36460},
}
@Comment{jabref-meta: databaseType:bibtex;}
@Comment{jabref-meta: saveOrderConfig:specified;author;false;year;false;title;false;}