参考文献
|
-
王平、林文暉、周宇軒、呂仁貴(2012)。雲端運算虛擬主機之攻擊模擬與分析。資訊安全通訊,19(2),1-16。
連結:
-
陳嘉玫(2014)。以汙染傳遞為基礎之行動軟體威脅行為偵測。第六屆台灣區Botnet 偵測與防治技術研討會(BoT2014)
連結:
-
Valgrind, available at http://valgrind.org/docs/manual/dist.news.html (2014/11/25)
-
TEMU, avaliable at http://bitblaze.cs.berkeley. edu/temu.html
-
J. McClurg, J. Friedman, and W. Ng, Android Privacy Leak Detection via Dynamic Taint Analysis, EECS 450 (2013).
-
Wikipedia, Spanning tree, available at: http://en.wikipedia.org/wiki/Spanning_tree,avaible at: http://en. wikipedia.org/ wiki/Taint_checking. (2014/12/12)
-
Wikipedia, taint checking, available at: http://en.wikipedia.org/wiki/Taint_checking.(2014/12/12)
-
梁光成 , 動態污點分析淺述, 2012 年12 月, available at: http://blog. sina.com.cn/s/blog_a3e16b1101017hf8.html
-
Honeynet project (2012), DroidBox. available at http://www.honeynet.org/gsoc/ slot11.(2014/10/15)
-
A. Desnos, Androguard, avaliable at http://code.google.com/p/androguard/ wiki/Usage.(2014/10/7)
-
Balakrishnan, G.,Reps, T.(2010).WYSINWYX: What you see is not what you eXecute.ACM Transactions on Programming Languages and Systems (TOPLAS),32(6),1-84.
-
Chad, W. A.,Bamshad, M.,Robin, B.(2007).Defending recommender systems: detection of profile injection attacks.Service Oriented Computing and Applications,1(3),157-170.
-
Chin, E.,Felt, A. P.,Greenwood, K.,Wagner, D.(2011).Analyzing Inter-Application Communication in Android.Proceedings of the 9th international conference on Mobile systems (MobiSys2011)
-
Kim, H.C.,Keromytis, A.D.,Covington, M.,Sahita, R.(2009).Capturing Information Flow with Concatenated Dynamic Taint Analysis.Proceedings: International Conference on Availability, Reliability and Security
-
Mannila, H.,Toivonen, H.,Verkamo, I.A.(1997).Discovery of frequent episodes in event sequences.Data Mining and Knowledge Discovery,1(3),259-289.
-
Newsome, J.,Song, D.(2005).Dynamic Taint Analysis for Automatic Detection, Analysis,and Signature Generation of Exploits on Commodity Software.Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05)
-
Portokalidis, G.,Slowinska, A.,Bos, H.(2006).Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation.SIGOPS Oper. Syst. Rev.,40(4)
-
Rastogi, V.,Chen, Y.,Enck, W.(2013).AppsPlayground: automatic security analysis of smartphone application.Proceedings of the third ACM conference on Data and application security and privacy (CODASPY13)
-
Tripp, O.,Pistoia, M.,Fink, S. J.,Sridharan, M.,Weisman, O.(2009).TAJ: effective taint analysis of web applications.Conference on Programming language design and implementation
-
Tsai, W. T.,Wei, X.,Chen, Y.,Paul, R.,Chung, J.Y.,Zhang, D.(2007).Data provenance in SOA: security, reliability, and integrity.Service Oriented Computing and Applications,1(4),223-247.
-
Wang, P.,Chao, K.M.,Lo, C.C.,Chao, W.J.(2014).Using Taint Propagation Checking for Threat Analysis of Cloud Services.IEEE International Conference on e-Business Engineering
-
Yin, H.,Song, D.,Egele, M.,Kruegel, C.,Kirda, E.(2007).Panorama: capturing system wide information flow for malware detection and analysis.Proceedings of the 14th ACM Conference on Computer and Communications Security
-
王鐵磊(2011)。博士論文(博士論文)。北京大學信息科技技術學院。
-
任霏霏、莊洪林、吳理發、潘璠(2013)。跨主機動態污點跟踪技術研究。計算機工程,39(3)
-
項國富、金海、鄒德清、陳學廣(2012)。基於虛擬化的安全監控。軟體學報,23(8),2173-2187。
|