共 49 条
[23]
Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (22)
:1-20
[25]
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1,
2015,
:280-291
[27]
Deep Android Malware Detection
[J].
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17),
2017,
:301-308
[28]
Mercaldo F, 2016, FME WORKS FORM, P22, DOI [10.1109/FormaliSE.2016.012, 10.1145/2897667.2897673]
[29]
Ransomware Steals Your Phone. Formal Methods Rescue It
[J].
FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS (FORTE 2016),
2016, 9688
:212-221
[30]
Milner R., 1989, Communication and concurrency