Cited By
View all- Yang NShen WLi JLiu XGuo XMa JMeng WJensen CCremers CKirda E(2023)Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party ApplicationsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623121(3048-3062)Online publication date: 15-Nov-2023
- Hou QDiao WWang YMao CYing LLiu SLiu XLi YGuo SNie MDuan H(2023)Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware EcosystemIEEE Transactions on Software Engineering10.1109/TSE.2023.327565549:7(3901-3921)Online publication date: Jul-2023
- Li CChen XSun RXue MWen SAhmed MCamtepe SXiang YRoychoudhury ACadar CKim M(2022)Cross-language Android permission specificationProceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3540250.3549142(772-783)Online publication date: 7-Nov-2022
- Show More Cited By