共 58 条
- [31] Jiang X., 2013, Android Malware
- [32] Jo NY, 2011, COMM COM INF SC, V151, P428
- [33] Jung W, 2012, CODES+ISSS'12:PROCEEDINGS OF THE TENTH ACM INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE-CODESIGN AND SYSTEM SYNTHESIS, P353
- [35] IccTA: Detecting Inter-Component Privacy Leaks in Android Apps [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 280 - 291
- [36] Mining permission patterns for contrasting clean and malicious android applications [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
- [38] Oberheide J, 2012, P SUMMERCON NEW YORK
- [39] Composite Constant Propagation: Application to Android Inter-Component Communication Analysis [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 77 - 88
- [40] Pandita R., 2013, Proceedings of USENIX Security, P527