共 20 条
- [1] Comparing the Usability of Cryptographic APIs [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 154 - 171
- [2] [Anonymous], 2017, P 38 IEEE S SEC PRIV
- [3] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
- [5] iRiS: Vetting Private API Abuse in iOS Applications [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 44 - 56
- [6] Egele M, 2013, P 2013 ACM SIGSAC C, P73, DOI DOI 10.1145/2508859.2516693
- [7] Enck William., 2010, Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), P393
- [8] Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications [J]. WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 236 - 247
- [9] Lazar David, 2014, P 5 AS PAC WORKSH SY, P1, DOI [10.1145/2637166.2637237, DOI 10.1145/2637166.2637237]
- [10] IccTA: Detecting Inter-Component Privacy Leaks in Android Apps [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 280 - 291