共 31 条
- [1] [Anonymous], 2018, ABS180101203 CORR
- [2] [Anonymous], 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS '13, ACM, New York, NY, USA, DOI DOI 10.1145/2508859.2516728
- [3] Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
- [4] Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 16 - 27
- [5] Statistical Deobfuscation of Android Applications [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 343 - 355
- [6] Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
- [7] Duan Y., 2018, 25th Annual Network and Distributed System Security Symposium, NDSS, P18
- [8] Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
- [9] Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 1041 - 1057
- [10] Gartner Inc, 2017, MARK GUID APPL SHIEL