共 29 条
[1]
[Anonymous], 2012, NDSS
[2]
[Anonymous], 2014, P 2014 ACM C SECURIT, DOI DOI 10.1145/2627393
[3]
[Anonymous], 2011, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, DOI [10.1145/2184489.2184500, DOI 10.1145/2184489.2184500]
[4]
[Anonymous], 2012, Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, Berkeley, CA, USA
[5]
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[6]
Bhoraskar R, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P1021
[7]
Book T., 2013, ARXIV PREPRINT ARXIV
[8]
Bugiel Sven., 2011, XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
[9]
MAdFraud: Investigating Ad Fraud in Android Applications
[J].
MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES,
2014,
:123-134
[10]
Dietz M, 2011, USENIX SEC S, P24