共 5 条
[1]
[Anonymous], 2011, P 16 INT C ARCH SUPP
[2]
Cai H Q, 2017, P 9 AS PAC S INT INT
[3]
Hoglund Greg, 2004, Exploiting Software: How to Break Code
[4]
MARTY R., 2011, P ACM S APPL COMPUTI, P178, DOI DOI 10.1145/1982185.1982226
[5]
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1329-1341