GroddDroid: a gorilla for triggering malicious behaviors, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.119-127, 2015. ,
DOI : 10.1109/MALWARE.2015.7413692
URL : https://hal.archives-ouvertes.fr/hal-01201743
Control Flow Analysis, Symposium on Compiler Optimization, pp.1-19, 1970. ,
The software model checker Blast, International Journal on Software Tools for Technology Transfer, vol.2, issue.4, pp.505-525, 2007. ,
DOI : 10.1007/s10009-007-0044-z
Refining data flow information using infeasible paths, ACM SIGSOFT Software Engineering Notes, vol.22, issue.6, pp.361-377, 1997. ,
DOI : 10.1145/267896.267921
The Yices SMT solver, 2006. ,
Automatic placement of authorization hooks in the linux security modules framework, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.330-339, 2005. ,
DOI : 10.1145/1102120.1102164
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy, International Symposium on Recent Advances in Intrusion Detection, 2009. ,
DOI : 10.1007/978-3-642-04342-0_22
Verifying information flow goals in Security-Enhanced Linux, Journal of Computer Security, vol.13, issue.1, pp.115-134, 2005. ,
DOI : 10.3233/JCS-2005-13105
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.645.7510
Consistency analysis of authorization hook placement in the Linux security modules framework, ACM Transactions on Information and System Security, vol.7, issue.2, pp.175-205, 2004. ,
DOI : 10.1145/996943.996944
Integrating Flexible Support for Security Policies into the Linux Operating System, FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX '01), 2001. ,
GENERIC and GIMPLE: A new tree representation for entire functions, GCC Developers Summit, pp.171-180, 2003. ,
Leveraging "choice" to automate authorization hook placement, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, p.145, 2012. ,
DOI : 10.1145/2382196.2382215
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.9638
Practical Fine-Grained Information Flow Control Using Laminar, ACM Transactions on Programming Languages and Systems, vol.37, issue.1, pp.1-51, 2014. ,
DOI : 10.1145/2638548
Laminar, ACM SIGPLAN Notices, vol.44, issue.6, pp.63-74, 2009. ,
DOI : 10.1145/1543135.1542484
Add missing LSM hooks in mq_timed{send,receive} and splice, Email on the Linux Security Modules development mailing list, 2016. ,
Using the GNU Compiler Collection (GCC), 2013. ,
Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.17-31, 2002. ,
DOI : 10.1109/FITS.2003.1264934
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, USENIX Conference on Security Symposium (Security'12). USENIX Association, pp.29-29, 2012. ,
Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis, ACM Conference on Computer and Communications Security, pp.116-127, 2007. ,
Using CQUAL for Static Analysis of Authorization Hook Placement, USENIX Security Symposium. USENIX Association, pp.33-48, 2002. ,