Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification. Bagheri, H., Kang, E., Malek, S., & Jackson, D. In 20th International Symposium on Formal Methods (FM), 2015.
Paper bibtex @inproceedings{DBLP:conf/fm/BagheriKMJ15,
author = {Hamid Bagheri and
Eunsuk Kang and
Sam Malek and
Daniel Jackson},
title = {Detection of Design Flaws in the Android Permission Protocol Through
Bounded Verification},
booktitle = {20th International Symposium on Formal Methods (FM)},
year = {2015},
url_paper = {pubs/2015/android-fm15.pdf}
}
% Downloaded from http://dspace.mit.edu/bitstream/handle/1721.1/89157/MIT-CSAIL-TR-2014-018.pdf by Matt, 2017-03-06
Downloads: 0
{"_id":"xS7g55AyiuAxfmqQr","bibbaseid":"bagheri-kang-malek-jackson-detectionofdesignflawsintheandroidpermissionprotocolthroughboundedverification-2015","author_short":["Bagheri, H.","Kang, E.","Malek, S.","Jackson, D."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Hamid"],"propositions":[],"lastnames":["Bagheri"],"suffixes":[]},{"firstnames":["Eunsuk"],"propositions":[],"lastnames":["Kang"],"suffixes":[]},{"firstnames":["Sam"],"propositions":[],"lastnames":["Malek"],"suffixes":[]},{"firstnames":["Daniel"],"propositions":[],"lastnames":["Jackson"],"suffixes":[]}],"title":"Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification","booktitle":"20th International Symposium on Formal Methods (FM)","year":"2015","url_paper":"pubs/2015/android-fm15.pdf","bibtex":"@inproceedings{DBLP:conf/fm/BagheriKMJ15,\n author = {Hamid Bagheri and\n Eunsuk Kang and\n Sam Malek and\n Daniel Jackson},\n title = {Detection of Design Flaws in the Android Permission Protocol Through\n Bounded Verification},\n booktitle = {20th International Symposium on Formal Methods (FM)},\n year = {2015},\n url_paper = {pubs/2015/android-fm15.pdf}\n}\n\n% Downloaded from http://dspace.mit.edu/bitstream/handle/1721.1/89157/MIT-CSAIL-TR-2014-018.pdf by Matt, 2017-03-06\n","author_short":["Bagheri, H.","Kang, E.","Malek, S.","Jackson, D."],"key":"DBLP:conf/fm/BagheriKMJ15","id":"DBLP:conf/fm/BagheriKMJ15","bibbaseid":"bagheri-kang-malek-jackson-detectionofdesignflawsintheandroidpermissionprotocolthroughboundedverification-2015","role":"author","urls":{" paper":"https://groups-csail-mit-edu.ezproxy.canberra.edu.au/sdg/pubs/2015/android-fm15.pdf"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://groups-csail-mit-edu.ezproxy.canberra.edu.au/sdg/sdgpub.bib","dataSources":["MautteQst6amcB23d","t9Kc2YBfktMvKserb"],"keywords":[],"search_terms":["detection","design","flaws","android","permission","protocol","through","bounded","verification","bagheri","kang","malek","jackson"],"title":"Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification","year":2015}