Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2013
The impact of vendor customizations on android security
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 623–634https://doi.org/10.1145/2508859.2516728The smartphone market has grown explosively in recent years, as more and more consumers are attracted to the sensor-studded multipurpose devices. Android is particularly ascendant; as an open platform, smartphone manufacturers are free to extend and ...
- research-articleNovember 2013
Diglossia: detecting code injection attacks with precision and efficiency
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1181–1192https://doi.org/10.1145/2508859.2516696Code injection attacks continue to plague applications that incorporate user input into executable programs. For example, SQL injection vulnerabilities rank fourth among all bugs reported in CVE, yet all previously proposed methods for detecting SQL ...