[PDF][PDF] Contextual policy enforcement in android applications with permission event graphs.

KZ Chen, S Dai, K MacNamara - lilicoding.github.io
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - people.eecs.berkeley.edu
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - tommagrino.com
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - cs.columbia.edu
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - ckev.in
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - Citeseer
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - ndss-symposium.org
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - people.csail.mit.edu
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

K Chen - pdfs.semanticscholar.org
Contextual Policy Enforcement in Android Applications with Permission Event Graphs Page 1
Contextual Policy Enforcement in Android Applications with Permission Event Graphs Kevin …

[PDF][PDF] Contextual Policy Enforcement in Android Applications with Permission Event Graphs

KZ Chen, N Johnson, V D'Silva, S Dai, K MacNamara… - cs.cornell.edu
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …