共 21 条
- [1] [Anonymous], 2014, NDSS
- [2] [Anonymous], 2016, INTERNET SECURITY RE
- [3] [Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
- [4] [Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
- [5] Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
- [6] Mining Apps for Abnormal Usage of Sensitive Data [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 426 - 436
- [7] Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
- [8] TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2014, 32 (02):
- [9] Felt Adrienne Porter, 2011, CCS 11
- [10] Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis [J]. 22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 576 - 587