共 31 条
[1]
[Anonymous], 2018, ABS180101203 CORR
[2]
[Anonymous], 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS '13, ACM, New York, NY, USA, DOI DOI 10.1145/2508859.2516728
[3]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[4]
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information
[J].
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017),
2017,
:16-27
[5]
Statistical Deobfuscation of Android Applications
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:343-355
[6]
Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
[7]
Duan Y., 2018, 25th Annual Network and Distributed System Security Symposium, NDSS, P18
[8]
Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
[9]
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:1041-1057
[10]
Gartner Inc, 2017, MARK GUID APPL SHIEL