共 12 条
[1]
[Anonymous], 2012, Adventures in bouncerland
[2]
Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
[3]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[4]
Enck W., 2010, P 9 USENIX C OP SYST, P1
[5]
Gagnon F., 2010, P 2010 INT C DAT COM
[6]
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151
[7]
Kocialkowski P, REPLICANT DEV FIND C
[8]
Lockheimer H, ANDROID AND SECURITY
[9]
Massicotte M., 2011, P 1 WORKSH BUILD AN, P19, DOI [10.1145/1978672.1978675, DOI 10.1145/1978672.1978675]
[10]
Moth D., MICROSOFT VISUAL STU