[1] |
Gartner . Gartner report[EB/OL]. [2016-02-16] .
|
[2] |
ENCK W , ONGTANG M , MCDANIEL P . Understanding Android security[J]. IEEE Security & Privacy, 2009,7(1): 50-57.
|
[3] |
ENCK W , OCTEAU D , MCDANIEL P , et al. A study of Android application security[J]. British Medical Journal, 2015,2(3859): 1175.
|
[4] |
卿斯汉 . Android 安全研究进展[J]. 软件学报, 2016,27(1):45-71. QING S H . Research progress on Android security[J]. Journal of Software, 2016,27(1):45-71.
|
[5] |
ELISH K O , SHU X , YAO D , et al. Profiling user-trigger dependence for Android malware detection[J]. Computers &Security, 2015,49(C): 255-273.
|
[6] |
FANG Z , HAN W , LI Y . Permission-based Android security:issues and counter measures[J]. Computers & Security, 2014(43): 205-218.
|
[7] |
SHABTAI A , KANONOV U , ELOVICI Y , et al. Andromaly: a behavioral malware detection framework for android devices[J]. Journal of Intelligent Information Systems, 2012,38(1): 161-190.
|
[8] |
ZHANG X , YING K , AAFER Y , et al. Life after app uninstallation: are the data still alive data residue attacks on Android[C]// The 23rd Network and Distributed System Security Symposium(NDSS 2016) , February 21-24,2016, San Diego, California, USA .[S.l.:s.n.], 2016.
|
[9] |
XING L , PAN X , WANG R , et al. Upgrading your android, elevating my malware: privilege escalation through mobile os updating[C]// The 2014 IEEE Symposium on Security and Privacy (SP 2014), May 18-21,2014, San Jose, California, USA. New Jersey:IEEE Press, 2014: 393-408.
|
[10] |
SEO J , KIM D , CHO D , et al. FLEXDROID: enforcing in-app privilege separation in Android[C]// The 23rd Network and Distributed System Security Symp(NDSS 2016), February 21-24,2016, San Diego, California, USA.[S.l.:s.n.], 2016.
|
[11] |
ARP D , SPREITZENBARTH M , HUBNER M D , et al. Drebin:effective and explainable detection of Android malware in your pocket[C]// The 21st Network and Distributed System Security Symp(NDSS 2014), February 23-26,2014, San Diego, California, USA.[S.l.:s.n.], 2014.
|
[12] |
CHECK POINT HummingBad: a persistent mobile chain attack[EB/OL]. [2016-02-16]. .
|
[13] |
Ded: decompiling Android applications[EB/OL]. [2016-02-16]. .
|
[14] |
Android decompiling with Dex2jar[EB/OL]. [2016-02-16]. .
|
[15] |
ENCK W , GILBERT P , CHUN B G , et al. TaintDroid: an information flow tracking system for real- time privacy monitoringon smartphones[J]. Communications of the ACM, 2014,57(3): 99-106.
|
[16] |
FUCHS A P , CHAUDHURI A , FOSTER J S . SCanDroid:automated security certification of Android Applications[R/OL]. (2015-0203) [2016-02-16]..
|
[17] |
ARZT S , RASTHOFER S , FRITZ C , et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps[J]. ACM Sigplan Notices, 2014,49(6): 259-269.
|
[18] |
WEI F , ROY S , FRITZ C , et al. Amandroid: a precise and general inter-component data flow analysisframework for security vetting of Android apps[C]// The 21st ACM Conference on Computerand Communications Security (CCS'14), November 3-7,2014, Scottsdale,Arizona,USA.[S.l.:s.n.], 2014: 1329-1341.
|
[19] |
FELT A P , CHIN E , HANNA S , et al. Android permissions demystied[C]// The 18th ACM Conference on Computer and Communications Security(CCS'11), Oct 17-21,2011, Chicago, IL,USA.[S.l.:s.n.], 2011: 627-638.
|
[20] |
AU K W Y , ZHOU Y F , HUANG Z , et al. 2012. PScout:analyzing the Android permission specification[C]// The 19th ACM Conference on Computer and Communications Security (CCS'12), Oct 16-18,2012, Raleigh,NC,USA. New York:ACM Press, 2012: 217-228.
|
[21] |
CHIN E , FELT A P , GREENWOOD K , et al. Analyzing inter-application communication inAndroid[C]// The 9th International Conference on Mobile Systems, Applications, and Services(MobiSys'11), June 29-July 1,2011, Washington, DC, USA.[S.l.:s.n.], 2011: 239-252.
|
[22] |
LU L , LI Z , WU Z , et al. Chex: statically vetting Android apps for component hijacking vulnerabilities[C]// The 19th ACM Conference on Computer and Communications Security(CCS 2012), Oct 16-18,2012, Raleigh, NC, USA. New York:ACM Press, 2012: 219-240.
|
[23] |
CHAN P P F , HUI L C K , YIU S M , et al. Droidchecker: analyzing Android applications for capability leak[C]// The 15th ACM Conf.on Security and Privacy in Wireless and Mobile Networks(WiSec 2012), April 16-18,2012, Tucson, Arizona, USA. New York:ACM Press, 2012: 125-136.
|
[24] |
BLASING T , BATYUK L , SCHMIDT A D , et al. An android application sandbox system for suspicious software detection[C]// The 5th International Conference on Malicious and Unwanted Software(MALWARE), Oct 19-20,2010, Fajardo, USA. New Jersey:IEEE Press, 2010: 55-62.
|
[25] |
SHABTAI A , KANONOV U , ELOVICI Y , et al. Andromaly: a behavioral malware detection framework for android devices[J]. Journal of Intelligent Information Systems, 2012,38(1): 161-160.
|
[26] |
TAM K , KHAN S J , FATTORI A , et al. Copperdroid: automatic reconstruction of android malware behaviors[C]// The Symposium on Network and Distributed System Security(NDSS), Aug 18,2015, San Diego,USA.[S.l.:s.n.], 2015.
|
[27] |
BURGUERA I , ZURUTUZA U , NADJM-TEHRANI S . Crowdroid:behavior-based malware detection system for android[C]// The 1st ACM Workshop on Security and Privacy in Smart Phones and Mobile Devices, October 17,2011, New York, NY, USA. New York:ACM Press, 2011: 15-26.
|
[28] |
DESNOS A , LANTZ P . DroidBox: an Android application sandboxfor dynamic analysis[EB/OL]. [2016-02-16]. .
|
[29] |
ZHOU Y , WANG Z , ZHOU W , et al. Hey, you, get off of my market: detecting malicious apps in official and alternative Android markets[C]// NDSS 2012, February 5-8,2012, San Diego,California,USA.[S.l.:s.n.], 2012.
|
[30] |
YAN L K , YIN H . DroidScope: seamlessly reconstructing OS and Dalvik semantic views for dynamic Android malware analysis[C]// The 21st USENIX Conference on Security Symposium, August 8-10, Bellevue, WA, USA. New York:ACM Press, 2012: 29.
|
[31] |
GRACE M , ZHOU Y , ZHANG Q , et al. RiskRanker: scalableand accurate zero -day android malware detection[C]// The 10th International Conference on Mobile Systems, Applications and Services, June 26-29, 2012 Low Wood Bay, The Lake District, UK. New York:ACM Press, 2012: 281-294.
|
[32] |
ZHANG Y , YANG M , XU B , et al. Vetting undesirable behaviors in Android apps with permissionuse analysis[C]// The 2013 ACM SIGSAC Conference on Computer & Communications Security, November 4-8,2013 Berlin, Germany. New York:ACM Press, 2013: 611-622.
|