共 30 条
- [1] Mobile threat report, (2016)
- [2] Livshits V.B., Lam M.S., Finding security vulnerabilities in Java applications with static analysis, Proc. of the Conf. on Usenix Security Symp., pp. 262-266, (2005)
- [3] Sabelfeld A., Myers A.C., Language-based information-flow security, IEEE Journal on Selected Areas in Communications, 21, 1, pp. 5-19, (2003)
- [4] Li L., Bissyande T.F., Papadakis M., Rasthofer S., Bartel A., Octeau D., Static analysis of Android apps: A systematic literature review, Proc. of the Information & Software Technology, pp. 67-95, (2017)
- [5] Avdiienko V., Kuznetsov K., Gorla A., Zeller A., Arzt S., Rasthofer S., Bodden E., Mining apps for abnormal usage of sensitive data, Proc. of the 37th Int'l Conf. on Software Engineering (ICSE), 1, pp. 426-436, (2015)
- [6] Feng Y., Anand S., Dillig I., Aiken A., Apposcopy: Semantics-based detection of android malware through static analysis, Proc. of the 22nd ACM SIGSOFT Int'l Symp. on Foundations of Software Engineering, pp. 576-587, (2014)
- [7] Pan X., Wang X., Duan Y., Wang X., Yin H., Dark hazard: Learning-based, large-scale discovery of hidden sensitive operations in Android apps, Proc. of the NDSS, (2017)
- [8] Li Y., Shen T., Sun X., Pan X., Mao B., Detection, classification and characterization of Android malware using API data dependency, Proc. of the Int'l Conf. on Security and Privacy in Communication Systems, pp. 23-40, (2015)
- [9] Aho A.V., Sethi R., Ullman J.D., Compilers, Principles, Techniques, (1986)
- [10] Reps T., Horwitz S., Sagiv M., Precise interprocedural dataflow analysis via graph reachability, Proc. of the 22nd ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages, pp. 49-61, (1995)