共 24 条
[1]
McaAfee Research Institute, McAfee labs threats report, pp. 1-53, (2016)
[2]
Felt A.P., Wang H.J., Moshchuk A., Et al., Permission re-delegation: attacks and defenses, USENIX Security Symposium, pp. 30-31, (2011)
[3]
Wu L., Du X., Zhang H., An effective access control scheme for preventing permission leak in Android, 2015 International Computing, Networking and Communications Conference, pp. 57-61, (2015)
[4]
Blasco J., Chen T.M., Automated generation of colluding apps for experimental research, Journal of Computer Virology and Hacking Techniques, 36, 17, pp. 1-12, (2017)
[5]
Arzt S., Rasthofer S., Fritz C., Et al., Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, ACM Sigplan Notices, 49, 6, pp. 259-269, (2014)
[6]
Asavoae I.M., Nguyen H.N., Roggenbach M., Et al., Utilising semantics for collusion detection in Android applications, International Workshop on Formal Methods for Industrial Critical Systems, pp. 142-149, (2016)
[7]
Bosu A., Liu F., Yao D., Et al., Collusive data leak and more: Large-scale threat analysis of inter-app communications, 2017 ACM Conference on Computer and Communications Security, pp. 71-85, (2017)
[8]
Wei F., Roy S., Ou X., Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps, 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1329-1341, (2014)
[9]
Li L., Bartel A., Bissyande T.F., Et al., ApkCombiner: combining multiple android appsto support inter-app analysis, IFIP International Information Security Conference, pp. 513-527, (2015)
[10]
Schlegel R., Zhang K., Zhou X., Et al., Soundcomber: a stealthy and context-aware sound trojan for smartphones, The 2015 Network and Distributed System Security Conference, pp. 17-33, (2011)