参考文献
|
-
A. Developers, UI/Application Exerciser Monkey. Retrieved on June 8, 2016, from http://developer.android.com/%0Atools/help/monkey.html.
-
Ahrendt, W.,Baar, T.,Beckert, B.,Bubel, R.,Giese, M.,Menzel, W.,Mostowski, W.,Roth, A.,Schlager, S.,Schmitt, P. H.(2005).The KeY tool Integrating object oriented designand formal verification.Software System Model,4(1),32-54.
-
Amir, M.(2010).Energy-aware location provider for the Android platform.University of Alexandria.
-
Android4me, AXMLPrinter2.jar[Online].Retrieved on June 10, 2016, fromhttps://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/android4me/AXMLPrinter2.jar.
-
Andrus, J.,Dall, C.,Van Hof, A.,Laadan, O.,Nieh, J.(2011).Cells: A virtual mobile smartphone architecture categories and subject descriptors.Proceedings of the Twenty-Third ACM Symposium on Operating System Princuples
-
Appelgate, Mollie Helen(2012).University of California, Los Angeles.
-
Balanza, M.,Alintanahin, K.,Abendan, O.,Dizon, J.(2011).DroidDreamlight lurks behind legitimateAndroid Apps.2012 6th International Conference on Malicious and Unwanted Software
-
Barrera, D.(2014).Carleton University.
-
Barrera, D.,Kayacik, H. G.,Van Oorschot, P. C.,Somayaji, A.(2010).A methodology for empirical analysis of permission-based security models and its application to Android.Proceedings of the 17th ACM Conference on Computers and Communications Security
-
Barros, P.,Just, R.,Millstein, S.,Vines, P.,Dietl, W.,Amorim, M.,Ernst, M. D.(2015).Static analysis of implicit control flow: Resolving Java reflection and Android intents.2015 30thIEEE/ACM International Conference onAutomated Software Engineering
-
Bugiel, S.,Davi, L.,Dmitrienko, A.,Fischer, T.,Sadeghi, A.(2011).,Technische Universitat Darmstadt.
-
Butler, J.(2004).VICE -Catch the hookers!.Black Hat USA,61,17-35.
-
Chin, E.,Felt, A. P.,Sekar, V.,Wagner, D.(2012).Measuring user confidence in smartphone security and privacy.Proceedings of the Eighth Symposium on Usable Privacy and Security
-
Desnos, A.,Gueguen, G.(2011).Android: From reversing to decompilation.Proceedings of the Black Hat Abu Dhabi
-
Dewald, A.,Holz, T.,Freiling, F. C.(2010).ADSandbox.Proceedings of the 2010 ACM Symposium on Applied Computing
-
Di Pietro, R.,Lombardi, F.,Rossicone, S.(2013).,未出版
-
Ding, J.,Chang, P.,Hsu, W.,Chung, Y.(2011).PQEMU: A parallel system emulator based onQEMU.2011 IEEE 17th International Conference on Parallel and Distributed Systems
-
Enck, W.,Gilbert, P.,Han, S.,Tendulkar, V.,Chun, B.-G.,Cox, L. P.,Jung, J.,McDaniel, P.,Sheth, A. N.(2014).TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones.ACM Transactions on Computer Systems (TOCS),32(2),393-407.
-
Enck, W.,Octeau, D.,Mcdaniel, P.,Chaudhuri, S.(2011).A study of Android application security.Proceedings of the 20th USENIX Conference on Security
-
Enck, W.,Ongtang, M.,McDaniel, P.(2009).On lightweight mobile phone application certification.Proceedings of the 16th ACM conference on Computer and Communications Security
-
Fang, Z.,Han, W.,Li, Y.(2014).Permission based Android security: Issues and countermeasures.Computer Security,43,205-218.
-
Felt, A. P.,Greenwood, K.,Wagner, D.(2011).The effectiveness of application permissions.Proceedings of the 2nd USENIX Conference on Web Application Development
-
Felt, A. P.,Ha, E.,Egelman, S.,Haney, A.,Chin, E.,Wagner, D.(2012).Android Permissions: User attention , comprehension , and behavior.Proceedings of the Eight Symposium on Usable Privacy and Security
-
Forman, I. R.,Forman, N.(2004).Java Reflection in Action.Manning Publications.
-
Fuchs, A. P.,Chaudhuri, A.,Foster, J. S.(2010).,University of Maryland Department of Computer Science.
-
Google, Android debugger bridge.Retrieved on June 9, 2016, from https://developer.android.com/studio/command-line/adb.
-
Jaglan, V.,Dalal, S.,Srinivasan, S.(2011).Enhancing security of agent-oriented techniques programs code using jar files.International Journal on Computer Science and Engineering,3(4),1627-1632.
-
Jones, K.(2001).Loadable kernel modules.Usenix Magazine,26(7),43-49.
-
Kelley, P. G.,Consolvo, S.,Cranor, L. F.,Jung, J.,Sadeh, N.,Wetherall, D.(2012).A conundrum of permissions: installing applications on an Android smartphone.International Conference on Financial Cryptography and Data Security
-
Kemp, R.,Palmer, N.,Kielmann, T.,Bal, H.(2012).Cuckoo: A computation offloading framework for smartphones.International Conference on Mobile Computer, Application, and Services
-
Kohno, T.(2004).Attacking and repairing the WinZip encryption scheme.Proceeding of the 11thACM Conferenceon Computer and Communications Security
-
Kornblum, J.(2006).Identifying almost identical files using context triggered piecewise hashing.Digital Investigation,3,91-97.
-
Kurhade, S. R.,Gite, N. D.(2015).Androidanti-malwareanalysis.International Journal of Advanced Research in Computer Engineering & Technology,4(5),2261-2266.
-
Lange, M.,Liebergeld, S.,Lackorzynski, A.,Warg, A.,Peter, M.(2011).L4Android: a generic operating system framework for secure smartphones.Proceedings of the 1st ACM workshop on Security and privacy in smartphones mobile devices
-
Liu, B.,Lin, J.,Sadeh, N.(2013).Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?.Proceedings of the 23rd international conference on World wide web
-
Martinelli, F.,Mercaldo, F.,Nardone, V.,Santone, A.(2017).Twinkle Twinkle Little DroidDream, How I Wonder What You Are?.2017 IEEE International Workshop on Metrology for Metrology for AeroSpace
-
Möller, A.,München, T. U.,Michahelles, F.,Diewald, S.,Roalter, L.,Kranz, M.(2012).Update behavior in app markets and security implications: A case study in google play.Proceedings of the 3rd International Workshop on Research in the Large, Held in Conjunction with Mobile HCI
-
Neuner, S.,Van Der Veen, V.,Lindorfer, M.,Huber, M.,Merzdovnik, G.,Mulazzani, M.,Weippl, E.(2014).Enter Sandbox: Android Sandbox Comparison.Proceedings of the Third Workshop on Mobile Security Technologies (MoST)
-
N. J. Percoco, and S. Schulte, Adventures in BouncerLand. Retrievedon June 8, 2016, from https://media.blackhat.com/bh-us-12/Briefings/Percoco/BH_US_12_Percoco_Adventures_in_Bouncerland_WP.pdf.
-
Rastogi, V.,Chen, Y.,Enck, W.(2013).AppsPlayground: Automatic security analysis of smartphone applications.Proceedings of the third ACM Conference on Data and Application Security and Privacy
-
Report, T.(2009).,未出版
-
Scientia mobile(2014).,未出版
-
Tam, K.,Khan, S. J.,Fattoriy, A.,Cavallaro, L.(2013).CopperDroid: automatic reconstruction of Android malware behaviors.Proceeding 2015 Network and Distributed System Security Symposium.2013
-
Tenenboim-Chekina, L.,Barad, O.,Shabtai, A.,Mimran, D.,Rokach, L.,Shapira, B.,Elovici, Y.(2013).Detecting application update attack on mobile devices through network features.2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),Turin, Italy:
-
Vidas, T.,Christin, N.(2014).Evading Android runtime analysis via sandbox detection.Proceedings of the 9thACMSymposium on Information, Computer and Communications Security
-
Viennot, N.,Garcia, E.,Nieh, J.(2014).A measurement study of google play.Proceedings of the 2014 ACM International conference on Measurement and modeling of computer systems
-
Willems, C.,Holz, T.,Freiling. F.(2007).Toward automated dynamic malware analysis using CWSandbox.IEEE Security and Privacy Magazine,5(2),32-39.
-
Xing, L.,Pan, X.,Wang, R.,Yuan, K.,Wang, X.(2014).Upgrading your Android, elevating my malware: privilege escalation through mobile OS updating.Proceedings of 2014 IEEE Symposium on Security and Privacy
-
Xu, J.,Li, S.,Zhang, T.(2014).Security analysis and protection based on Smaliinjection for Android applications.International Conference on Algorithms and Architectures for Parallel Processing
-
Xu, R.,Saïdi, H.,Anderson, R.,Saıdi, H.(2012).Aurasium: practical policy enforcement for Android applications.Proceedings of the 21st USENIX Conference on Security Symposium
-
You, I.,Yim, K.(2010).Malware obfuscation techniques: Abrief survey.Proceedings of the 2010 International Conference on Broadband, Wireless Computer, and Communication and Applications
-
Zhang, M.,Yin, H.(2014).AppSealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications.Proceedings 2014 Network and Distributed System Security Symposium
-
Zhang, P.,Sun, H.,Yan, Z.(2013).Mechanism for security enhancement in mobile application installation.Proceedings of the 2012 2ndInternational Conference on Computer and Information Applications
-
Zhang, X.,Breitinger, F.,Baggili, I.(2016).Rapid Android parser for investigating DEX files (RAPID).Digital Investigation,17,28-39.
-
Zhang, Y.,Yang, M.,Xu, B.,Yang, Z.,Gu, G.,Ning, P.,Wang, X. S.,Zang, B.(2013).Vetting undesirable behaviors in android apps with permission use analysis.Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
-
Zheng, M.,Sun, M.,Lui, J. C. S.(2013).DroidAnalytics: Asignature based analytic system to collect, extract, analyze and associateAndroid malware.2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
-
Zhou, W.,Zhou, Y.,Jiang, X.,Ning, P.(2012).Detecting repackaged smartphone applications in third-party android marketplaces.Proceedings of the second ACM Conference on Data and Application Security and Privacy
-
Zhou, Y.,Jiang, X.(2012).Dissecting Android malware: Characterization and evolution.2012 IEEE Symposium on Security and Privacy
|