[1] |
HOARE C A R . Communicating sequential processes[M]. NJ,USA: Prentice Hall, 1985.
|
[2] |
ENCK W , GILBERT P , CHUN B G ,et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J]. ACM Transactions on Computer Systems, 2010,57(3): 393-407.
|
[3] |
VACHHARAJANI N , BRIDGES M J , CHANG J ,et al. RIFLE:an architectural framework for user-centric information-flow security[C]// Proceedings of 37th International Symposium on Microarchitecture (MICRO-37'04). 2004: 243-254.
|
[4] |
BANERJEE S , DEVECSERY D , CHEN P M ,et al. Iodine:fast dynamic taint tracking using rollback-free optimistic hybrid analysis[C]// Proceedings of 2019 IEEE Symposium on Security and Privacy (SP). 2019: 490-504.
|
[5] |
ZHANG M , YIN H . Efficient,context-aware privacy leakage confinement for android applications without firmware modding[C]// Proceedings of the 9th ACM Symposium on Information,Computer and Communications Security. 2014: 259-270.
|
[6] |
JIA Y J , CHEN Q A , WANG S Q ,et al. ContexIoT:towards providing contextual integrity to appified IoT platforms[C]// Proceedings of 2017 Network and Distributed System Security Symposium. 2017.
|
[7] |
ZONG P , LV T , WANG D ,et al. FuzzGuard:filtering out unreachable inputs in directed grey-box fuzzing through deep learning[C]// Proceedings of 29th USENIX Security Symposium (USENIX-SS'20). 2020.
|
[8] |
SHE D D , CHEN Y Z , SHAH A ,et al. Neutaint:efficient dynamic taint analysis with neural networks[C]// Proceedings of 2020 IEEE Symposium on Security and Privacy (SP). 2020: 1527-1543.
|
[9] |
NGUYEN-TUONG A , GUARNIERI S , GREENE D ,et al. Automatically hardening web applications using precise tainting[M]// Security and Privacy in the Age of Ubiquitous Computing. Boston,MA: Springer US, 2005: 295-307.
|
[10] |
NEWSOME J , SONG D . Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software[C]// Proceedings of the Network and Distributed System Secu-rity Symposium (NDSS '05). 2005.
|
[11] |
KONG J F , ZOU C C , ZHOU H Y . Improving software security via runtime instruction-level taint checking[C]// Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability. 2006: 18-24.
|
[12] |
HALDAR V , CHANDRA D , FRANZ M . Dynamic taint propagation for Java[C]// Proceedings of 21st Annual Computer Security Applications Conference (ACSAC'05). 2005:311.
|
[13] |
VOGT P , NENTWICH F , JOVANOVIC N ,et al. Cross site scripting prevention with dynamic data tainting and static analysis[C]// Proceedings of the Network and Distributed System Security Symposium (NDSS '07). 2007.
|
[14] |
CABALLERO J , POOSANKAM P , MCCAMANT S ,et al. Input generation via decomposition and restitching:finding bugs in malware[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010: 413-425.
|
[15] |
ENCK W , GILBERT P , CHUN B G ,et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C]// Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation. 2019: 393-407.
|
[16] |
ZHU D Y , JUNG J , SONG D ,et al. TaintEraser[J]. ACM SIGOPS Operating Systems Review, 2011,45(1): 142-154.
|
[17] |
KANG M G , MCCAMANT S , POOSANKAM P ,et al. DTA++:dynamic taint analysis with targeted control-flow propagation[C]// Proceedings of the Network and Distributed System Security Symposium (NDSS '11). 2011.
|
[18] |
ARZT S , RASTHOFER S , FRITZ C ,et al. FlowDroid:precise context,flow,field,object-sensitive and lifecycle-aware taint analysis for Android Apps[C]// Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2014: 259-269.
|
[19] |
WEI F G , ROY S , OU X M ,et al. Amandroid:a precise and general inter-component data flow analysis framework for security vetting of Android Apps[C]// Proceedings of the ACM Conference on Computer and Communications Security. 2014: 1329-1341.
|
[20] |
LI L , BARTEL A , BISSYANDé T F ,, et al . IccTA:detecting inter-component privacy leaks in android Apps[C]// Proceedings of 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. 2015: 280-291.
|
[21] |
BIANCHI A , CORBETTA J , INVERNIZZI L ,et al. What the App is that? Deception and countermeasures in the android user interface[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. 2015: 931-948.
|
[22] |
ZHAO Q C , ZUO C S , DOLAN-GAVITT B ,et al. Automatic uncovering of hidden behaviors from input validation in mobile Apps[C]// Proceedings of 2020 IEEE Symposium on Security and Privacy (SP). 2020: 1106-1120.
|
[23] |
SONG F , TOUILI T . Model-checking for android malware detection[M]// Programming Languages and Systems. Cham: Springer International Publishing, 2014: 216-235.
|
[24] |
BAI G D , YE Q Q , WU Y Z ,et al. Towards model checking Android applications[J]. IEEE Transactions on Software Engineering, 2018,44(6): 595-612.
|
[25] |
MERCALDO F , NARDONE V , SANTONE A ,et al. Ransomware steals your phone.formal methods rescue it[M]// Formal Techniques for Distributed Objects,Components,and Systems. Cham: Springer International Publishing, 2016: 212-221.
|
[26] |
MERCALDO F , NARDONE V , SANTONE A ,et al. Download malware? No,thanks:how formal methods can block update attacks[C]// Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering. 2016: 22-28.
|
[27] |
BATTISTA P , MERCALDO F , NARDONE V ,et al. Identification of android malware families with model checking[C]// Proceedings of the 2nd International Conference on Information Systems Security and Privacy. 2016: 542-547.
|
[28] |
CANFORA G , MARTINELLI F , MERCALDO F ,et al. LEILA:formal tool for identifying mobile malicious behaviour[J]. IEEE Transactions on Software Engineering, 2019,45(12): 1230-1252.
|
[29] |
MILNER R . Communication and concurrency[M]. Prentice Hall, 1989.
|
[30] |
BARBUTI R , DE FRANCESCO N , SANTONE A ,et al. Selective mu-calculus and formula-based equivalence of transition systems[J]. Journal of Computer and System Sciences, 1999,59(3): 537-556.
|
[31] |
SURHONE L M , TENNOE M T , HENSSONOW S F ,et al. Jimple[M]. Betascript Publishing, 2010.
|
[32] |
SHEN F , VECCHIO J D , MOHAISEN A ,et al. Android malware detection using complex-flows[C]// Proceedings of IEEE Transactions on Mobile Computing. 2017: 1231-1245.
|