共 164 条
[81]
Bai GD, 2010, L N INST COMP SCI SO, V50, P326
[82]
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:73-84
[83]
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:96-111
[84]
Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
[85]
Repackaging Android Applications for Auditing Access to Private Data
[J].
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES),
2012,
:388-396
[86]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[87]
Bugiel S., 2012, Towards a framework for android security modules: Extending se android type enforcement to android middleware
[88]
Bugiel S., 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, P51
[89]
Chen QA, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P1037
[90]
Chin E, 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, New York, NY, USA, P239, DOI DOI 10.1145/1999995.2000018