[1] |
李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11.
|
|
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11.
|
[2] |
中国消费者协会. APP 个人信息泄露情况调查报告[R]. 中国消费者协会, 2018.
|
|
CCA.Survey on personal information leakage by APP[R]. China Consumers Association, 2018.
|
[3] |
奇虎360.2018中国手机安全生态研究报告[R]. 北京奇虎科技有限公司, 2018.
|
|
Qihoo 360.China mobile phone safety ecology report[R]. Qihoo 360 Technology Co.,Ltd., 2018.
|
[4] |
GRACE M C , ZHOU W , JIANG X ,et al. Unsafe exposure analysis of mobile in-APP advertisements[C]// The ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2012: 101-112.
|
[5] |
CHEN K , LIU P , ZHANG Y . Achieving accuracy and scalability simultaneously in detecting application clones on Android markets[C]// The ACM International Conference on Software Engineering. ACM, 2014: 175-186.
|
[6] |
NARAYANAN A , CHEN L , CHAN C K . Addetect:automated detection of android ad libraries using semantic analysis[C]// The IEEE International Conference on Intelligent Sensors,Sensor Networks and Information Processing. IEEE, 2014: 1-6.
|
[7] |
LIU B , LIU B , JIN H ,et al. Efficient privilege de-escalation for ad libraries in mobile APPs[C]// The ACM Annual International Conference on Mobile Systems,APPlications,and Services. ACM, 2015: 89-103.
|
[8] |
CRUSSELL J , GIBLER C , CHEN H . Scalable semantics-based detection of similar android applications[C]// The European Symposium on Computer Security. 2013: 1-21.
|
[9] |
WANG H , GUO Y , MA Z ,et al. WuKong:a scalable and accurate two-phase approach to Android APP clone detection[C]// The ACM International Symposium on Software Testing and Analysis. ACM, 2015: 71-82.
|
[10] |
MA Z , WANG H , GUO Y ,et al. LibRadar:fast and accurate detection of third-party libraries in Android apps[C]// The ACM International Conference on Software Engineering. ACM, 2016: 653-656.
|
[11] |
LI M , WANG W , WANG P ,et al. LibD:scalable and precise third-party library detection in android markets[C]// The ACM International Conference on Software Engineering. ACM, 2017: 335-346.
|
[12] |
BACKES M , BUGIEL S , DERR E . Reliable third-party library detection in Android and its security applications[C]// The ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 356-367.
|
[13] |
FELT A , HA E , EGELMAN S ,et al. Android permissions:User attention,comprehension,and behavior[C]// The ACM Symposium on Usable Privacy and Security. ACM, 2012: 1-14.
|
[14] |
FAWAZ K , SHIN K G . Location privacy protection for smartphone users[C]// The ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014: 239-250.
|
[15] |
TSAI L , WIJESEKERA P , REARDON J ,et al. Turtle guard:helping android users apply contextual privacy preferences[C]// The ACM Symposium on Usable Privacy and Security. ACM, 2017: 145-162.
|
[16] |
AGARWAL Y , HALL M . ProtectMyPrivacy:detecting and mitigating privacy leaks on iOS devices using crowdsourcing[C]// The ACM Annual International Conference on Mobile Systems,APPlications,and Services. ACM, 2013: 97-110.
|
[17] |
LIU B , LIN J , SADEH N . Reconciling mobile app privacy and usability on smartphones:could user privacy profiles help?[C]// The ACM International Conference on World Wide Web. ACM, 2014: 201-212.
|
[18] |
LIU R , CAO J , YANG L ,et al. PriWe:recommendation for privacy settings of mobile APPs based on crowdsourced users[C]// IEEE International Conference on Mobile Services. IEEE, 2015: 150-157.
|
[19] |
RASHIDI B , FUNG C , NGUYEN A ,et al. Android user privacy preserving through crowdsourcing[J]. IEEE Transactions on Information Forensics and Security, 2018,13(3): 773-787.
|
[20] |
ZAKI M J . Scalable algorithms for association mining[J]. IEEE Transactions on Knowledge and Data Engineering, 2000,12(3): 372-390.
|
[21] |
LU L , LI Z , WU Z ,et al. CHEX:statically vetting android apps for component hijacking vulnerabilities[C]// The ACM SIGSAC Conference on Computer and Communications Security. ACM, 2012: 229-240.
|
[22] |
ENCK W , GILBERT P , HAN S ,et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J]. ACM Transactions on Computer Systems, 2014,32(2): 1-29.
|
[23] |
LIU K , TERZI E . A framework for computing the privacy scores of users in online social networks[J]. ACM Transactions on Knowledge Discovery from Data, 2010,5(1): 1-30.
|
[24] |
LI F H , WANG X Y , NIU B ,et al. TrackU:exploiting user’s mobility behavior via wifi list[C]// IEEE Global Communications Conference (GLOBECOM). IEEE, 2017: 1-6.
|
[25] |
EGIRAUL T . Google play unofficial python API[Z]. GitHub, 2016.
|
[26] |
XING L , PAN X , WANG R ,et al. Upgrading your android,elevating my malware:privilege escalation through mobile OS updating[C]// The IEEE Symposium on Security and Privacy. IEEE, 2014: 393-408.
|