共 308 条
[21]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[22]
StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework
[J].
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE),
2016,
:725-735
[24]
Mining Apps for Abnormal Usage of Sensitive Data
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1,
2015,
:426-436
[25]
Azim T, 2013, ACM SIGPLAN NOTICES, V48, P641, DOI [10.1145/2509136.2509549, 10.1145/2544173.2509549]
[26]
Reliable Third-Party Library Detection in Android and its Security Applications
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:356-367
[27]
Towards Understanding and Reasoning about Android Interoperations
[J].
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019),
2019,
:223-233
[28]
Bagheri Hamid, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P514, DOI 10.1109/DSN.2016.53
[29]
Efficient, Evolutionary Security Analysis of Interacting Android Apps
[J].
PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME),
2018,
:357-368