共 26 条
[1]
Au K., 2012, P ACM COMP COMM SEC, P46
[2]
Bal G., 2012, P IEEE S SEC PRIV, P1
[3]
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:73-84
[4]
Benton K., 2013, P 5 INT WORKSH SECUR, P1
[5]
Beresford A., 2011, P HOT MOB, P45
[6]
Chang CT, 2011, J INF SCI ENG, V27, P995
[7]
El Agha M., 2012, EFFIC FAST INITIAL A, V4, P21, DOI [10.5815/ijisa.2012.01.03, DOI 10.5815/IJISA.2012.01.03]
[8]
Enck W., 2009, P 16 ACM C COMP COMM, P14
[9]
Enck William, 2010, P USENIX S OP SYST D
[10]
Felt A. P., 2012, UCBEECS201270, P41