共 50 条
[21]
A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART)
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:147-156
[22]
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1629-1631
[23]
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model
[J].
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017),
2017, 10292
:604-622
[24]
Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices
[J].
INFORMATION SYSTEMS SECURITY AND PRIVACY,
2018, 867
:130-147
[25]
ICC-Inspect: Supporting Runtime Inspection of Android Inter-Component Communications
[J].
2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT),
2018,
:80-83
[26]
Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:179-192
[27]
Android Sensor Data Anonymization
[J].
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES,
2013, 8145
:469-471
[28]
Data Synchronization on Android Clients
[J].
PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN),
2015,
:212-216
[29]
Protecting Data in Android External Data Storage
[J].
2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1,
2019,
:924-925
[30]
A Platform for Gathering Multilayer Runtime Data in a Datacenter
[J].
PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE,
2015,
:449-452