ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1102.2445
  4. Cited By
Quire: Lightweight Provenance for Smart Phone Operating Systems

Quire: Lightweight Provenance for Smart Phone Operating Systems

USENIX Security Symposium (USENIX Security), 2011
11 February 2011
Michael Dietz
Shashi Shekhar
Yuliy Pisetsky
Anhei Shu
D. Wallach
ArXiv (abs)PDFHTML

Papers citing "Quire: Lightweight Provenance for Smart Phone Operating Systems"

19 / 19 papers shown
Aster: Fixing the Android TEE Ecosystem with Arm CCA
Aster: Fixing the Android TEE Ecosystem with Arm CCA
Mark Kuhne
Supraja Sridhara
Andrin Bertschi
Nicolas Dutly
Srdjan Capkun
Shweta Shinde
332
4
0
23 Jul 2024
A Systematic Study of Android Non-SDK (Hidden) Service API Security
A Systematic Study of Android Non-SDK (Hidden) Service API SecurityIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Shengqi Dang
Yacong Gu
Purui Su
Kun Sun
Yajin Zhou
Zhi Wang
Qi Li
ELM
94
7
0
17 Mar 2022
Systematic Mutation-based Evaluation of the Soundness of
  Security-focused Android Static Analysis Techniques
Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis TechniquesACM Transactions on Privacy and Security (ACM TOPS), 2021
Amit Seal Ami
Kaushal Kafle
Kevin Moran
Adwait Nadkarni
Denys Poshyvanyk
120
13
0
13 Feb 2021
SeCloak: ARM Trustzone-based Mobile Peripheral Control
SeCloak: ARM Trustzone-based Mobile Peripheral ControlACM SIGMOBILE International Conference on Mobile Systems, Applications, and Services (MobiSys), 2018
Matthew Lentz
Rijurekha Sen
P. Druschel
Bobby Bhattacharjee
147
71
0
23 Jan 2020
PINPOINT: Efficient and Effective Resource Isolation for Mobile Security
  and Privacy
PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy
P. Ratazzi
Ashok Bommisetti
Nian Ji
Wenliang Du
159
9
0
23 Jan 2019
A Study of Data Store-based Home Automation
A Study of Data Store-based Home Automation
Kaushal Kafle
Kevin Moran
Sunil Manandhar
Adwait Nadkarni
Denys Poshyvanyk
216
27
0
04 Dec 2018
Regulating Access to System Sensors in Cooperating Programs
Regulating Access to System Sensors in Cooperating Programs
Giuseppe Petracca
Jens Grossklags
Patrick McDaniel
Trent Jaeger
102
0
0
02 Aug 2018
Discovering Flaws in Security-Focused Static Analysis Tools for Android
  using Systematic Mutation
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
R. Bonett
Kaushal Kafle
Kevin Moran
Adwait Nadkarni
Denys Poshyvanyk
111
35
0
26 Jun 2018
SCLib: A Practical and Lightweight Defense against Component Hijacking
  in Android Applications
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
Daoyuan Wu
Yao Cheng
Jianfeng Ma
Yingjiu Li
R. Deng
AAML
105
18
0
13 Jan 2018
Android Inter-App Communication Threats and Detection Techniques
Android Inter-App Communication Threats and Detection Techniques
S. Bhandari
Wafa Ben Jaballah
Vineeta Jain
V. Laxmi
A. Zemmari
M. Gaur
M. Mosbah
Mauro Conti
129
44
0
30 Nov 2016
SecComp: Towards Practically Defending Against Component Hijacking in
  Android Applications
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications
Daoyuan Wu
Jianfeng Ma
Yingjiu Li
R. Deng
102
4
0
12 Sep 2016
BinderCracker: Assessing the Robustness of Android System Services
BinderCracker: Assessing the Robustness of Android System Services
Huan Feng
Kang G. Shin
90
12
0
23 Apr 2016
Cross-Platform Analysis of Indirect File Leaks in Android and iOS
  Applications
Cross-Platform Analysis of Indirect File Leaks in Android and iOS Applications
Daoyuan Wu
R. Chang
90
0
0
31 Oct 2015
A Systematic Security Evaluation of Android's Multi-User Framework
A Systematic Security Evaluation of Android's Multi-User Framework
P. Ratazzi
Yousra Aafer
A. Ahlawat
Hao Hao
Yifei Wang
Wenliang Du
97
23
0
28 Oct 2014
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in
  Android Apps
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps
Daoyuan Wu
Xiapu Luo
R. Chang
101
14
0
24 May 2014
Sound and Precise Malware Analysis for Android via Pushdown Reachability
  and Entry-Point Saturation
Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point SaturationSecurity and Privacy in Smartphones and Mobile Devices (SPSM), 2013
Shuying Liang
Andrew W. Keep
M. Might
Steven Lyde
Thomas Gilray
P. Aldous
David Van Horn
136
46
0
17 Nov 2013
Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in
  the Android Operating System
Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating SystemWorld Congress on Formal Methods (FM), 2013
Hendra Gunadi
Alwen Tiu
157
32
0
11 Nov 2013
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
PlaceRaider: Virtual Theft in Physical Spaces with SmartphonesNetwork and Distributed System Security Symposium (NDSS), 2012
R. Templeman
Zahid Rahman
David J. Crandall
Apu Kapadia
176
95
0
26 Sep 2012
Automatically Securing Permission-Based Software by Reducing the Attack
  Surface: An Application to Android
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android
Alexandre Bartel
Jacques Klein
Monperrus Martin
Yves Le Traon
204
155
0
22 May 2012
1
Page 1 of 1