↓ Skip to main content

Research in Attacks, Intrusions, and Defenses

Overview of attention for book
Cover of 'Research in Attacks, Intrusions, and Defenses'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform’s Main Memory
  3. Altmetric Badge
    Chapter 2 Hypervisor Memory Forensics
  4. Altmetric Badge
    Chapter 3 Server-Side Code Injection Attacks: A Historical Perspective
  5. Altmetric Badge
    Chapter 4 Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
  6. Altmetric Badge
    Chapter 5 Systematic Analysis of Defenses against Return-Oriented Programming
  7. Altmetric Badge
    Chapter 6 SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel
  8. Altmetric Badge
    Chapter 7 API Chaser: Anti-analysis Resistant Malware Analyzer
  9. Altmetric Badge
    Chapter 8 FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors
  10. Altmetric Badge
    Chapter 9 Deobfuscating Embedded Malware Using Probable-Plaintext Attacks
  11. Altmetric Badge
    Chapter 10 Detecting Traditional Packers, Decisively
  12. Altmetric Badge
    Chapter 11 Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
  13. Altmetric Badge
    Chapter 12 Active Credential Leakage for Observing Web-Based Attack Cycle
  14. Altmetric Badge
    Chapter 13 Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications
  15. Altmetric Badge
    Chapter 14 Tamper-Resistant LikeJacking Protection
  16. Altmetric Badge
    Chapter 15 Deconstructing the Assessment of Anomaly-based Intrusion Detectors
  17. Altmetric Badge
    Chapter 16 Practical Context-Aware Permission Control for Hybrid Mobile Applications
  18. Altmetric Badge
    Chapter 17 Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses
  19. Altmetric Badge
    Chapter 18 Mobile Malware Detection Based on Energy Fingerprints — A Dead End?
  20. Altmetric Badge
    Chapter 19 Research in Attacks, Intrusions, and Defenses
  21. Altmetric Badge
    Chapter 20 Connected Colors: Unveiling the Structure of Criminal Networks
  22. Altmetric Badge
    Chapter 21 CloudFence: Data Flow Tracking as a Cloud Service
  23. Altmetric Badge
    Chapter 22 Practical Attacks against the I2P Network
Attention for Chapter 16: Practical Context-Aware Permission Control for Hybrid Mobile Applications
Altmetric Badge


3 Dimensions

Readers on

26 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Practical Context-Aware Permission Control for Hybrid Mobile Applications
Chapter number 16
Book title
Research in Attacks, Intrusions, and Defenses
Published by
Springer Berlin Heidelberg, October 2013
DOI 10.1007/978-3-642-41284-4_16
Book ISBNs
978-3-64-241283-7, 978-3-64-241284-4

Kapil Singh


Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright

Mendeley readers

The data shown below were compiled from readership statistics for 26 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Spain 1 4%
Netherlands 1 4%
Unknown 24 92%

Demographic breakdown

Readers by professional status Count As %
Student > Master 11 42%
Student > Ph. D. Student 7 27%
Researcher 3 12%
Other 1 4%
Student > Bachelor 1 4%
Other 2 8%
Unknown 1 4%
Readers by discipline Count As %
Computer Science 20 77%
Engineering 2 8%
Business, Management and Accounting 1 4%
Nursing and Health Professions 1 4%
Unknown 2 8%