Login / Signup

A methodology for empirical analysis of permission-based security models and its application to android.

David BarreraHilmi Günes KayacikPaul C. van OorschotAnil Somayaji
Published in: CCS (2010)
Keyphrases