共 29 条
[11]
Enck W., 2010, Communications of the ACM, V10, P1, DOI DOI 10.1145/2494522
[12]
F-Secure, MOB THREAT REP Q3 20
[13]
Felt AdriennePorter., 2011, Proceedings of the 20th USENIX Security Symposium, P22
[14]
Fragkaki Elli, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P1, DOI 10.1007/978-3-642-33167-1_1
[15]
Gosling James, 1996, The Java Language Specification
[16]
Grace M. C., 2012, 5 ACM C SEC PRIV WIR, P101
[17]
Hornyack P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P639
[18]
Lea D, 2010, Dlmalloc
[19]
Livshits Benjamin., 2013, Proceedings of the 22Nd USENIX Conference on Security, SEC'13, P113
[20]
McGraw G., 1999, Securing Java: getting down to business with mobile code