Back to Results
First PageMeta Content
Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing


Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University
Add to Reading List

Document Date: 2014-02-20 13:15:14


Open Document

File Size: 92,96 KB

Share Result on Facebook

Company

Kaspersky / Gil Vegliach1 1 NICTA Software Systems Research Group / McAfee / Nokia / G. Chun L. P. / Google Inc. / /

IndustryTerm

internet server / malicious applications / mobile malware developers / install-time only applications / media player / autonomous spacecraft software / open-source software stack / Web application development / /

OperatingSystem

Linux / Android / Symbian OS / /

Organization

ICT Centre of Excellence / Australian Government / U.S. Securities and Exchange Commission / Australian Research Council / Australian National University / Department of Broadband / Communications and the Digital Economy / /

Product

Currently / Symbian OS / /

ProgrammingLanguage

Java / K / /

Technology

virtual machine / Broadband / SMS / Android system / Linux system / Java / Linux / API / smart phones / smartphones / GPS / Android / mobile device / GUI / /

URL

http /

SocialTag