Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
12
views
11
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,991
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2016
NaClDroid: Native Code Isolation for Android Applications
other
Author(s):
Elias Athanasopoulos
,
Vasileios P. Kemerlis
,
Georgios Portokalidis
,
Angelos D. Keromytis
Publication date
(Online):
September 15 2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Applications of SAXS
Most cited references
11
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A survey of mobile malware in the wild
Matthew Finifter
,
Adrienne Porter Felt
,
Steve Hanna
…
(2011)
0
comments
Cited
68
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Android permissions demystified
Adrienne Porter Felt
,
David J. Wagner
,
Dawn Song
…
(2011)
0
comments
Cited
67
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
On lightweight mobile phone application certification
Patrick McDaniel
,
Machigar Ongtang
,
William Enck
(2009)
0
comments
Cited
44
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
September 15 2016
Pages
: 422-439
DOI:
10.1007/978-3-319-45744-4_21
SO-VID:
55ace323-c7af-4b33-b897-9fea6ef94e78
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
pp. 27
Toward an Efficient Website Fingerprinting Defense
pp. 47
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
pp. 69
Comparing Password Ranking Algorithms on Real-World Password Datasets
pp. 91
Scalable Two-Factor Authentication Using Historical Data
pp. 111
On the Implications of Zipf’s Law in Passwords
pp. 135
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
pp. 154
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
pp. 173
Efficient Encrypted Keyword Search for Multi-user Data Sharing
pp. 199
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
pp. 217
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
pp. 238
A Machine Learning Approach for Detecting Third-Party Trackers on the Web
pp. 261
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
pp. 279
Attribute-Based Signatures for Supporting Anonymous Certification
pp. 301
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes
pp. 324
Lightweight Delegatable Proofs of Storage
pp. 344
Anonymous RAM
pp. 363
Efficient Sanitizable Signatures Without Random Oracles
pp. 383
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook
pp. 401
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images
pp. 422
NaClDroid: Native Code Isolation for Android Applications
pp. 440
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
pp. 458
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
pp. 477
Android Permission Recommendation Using Transitive Bayesian Inference Model
pp. 501
Spot the Difference: Secure Multi-execution and Multiple Facets
pp. 520
On Reductions from Multi-Domain Noninterference to the Two-Level Case
pp. 538
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries
pp. 561
Let’s Face It: Faceted Values for Taint Tracking
pp. 581
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming
pp. 602
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets
Similar content
3,991
Who like androids more: Japanese or US Americans?
Authors:
Christoph Bartneck
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices
Authors:
Behnood Momenzadeh
,
Shakthidhar Gopavaram
,
Sanchari Das
…
Toward Automatically Generating Privacy Policy for Android Apps
Authors:
Le Yu
,
Tao Zhang
,
Xiapu Luo
…
See all similar
Cited by
1
A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps
Authors:
Stylianos Monogios
,
Konstantinos Limniotis
,
Nicholas Kolokotronis
…
See all cited by