[1] |
XIA M , GONG L , LYU Y ,et al. Effective real-time android application auditing[C]// IEEE Symposium on Security and Privacy. 2015: 899-914.
|
[2] |
BIANCHI A , FRATANTONIO Y , KRUEGEL C ,et al. NJAS:sandboxing unmodified applications in non-rooted devices running stock Android[C]// ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 2015: 27-38.
|
[3] |
BACKES M , BUGIEL S , HAMMER C ,et al. Boxify:full-fledged app sandboxing for stock android[C]// Usenix Conference on Security Symposium. 2015: 691-706.
|
[4] |
AFONSO V M , AMORIM M F D , GRéGIO A R A ,et al. Identifying Android malware using dynamically obtained features[J]. Journal of Computer Virology and Hacking Techniques, 2015,11(1): 9-17.
|
[5] |
QIU L , ZHANG Z , SHEN Z ,et al. AppTrace:dynamic trace on Android devices[C]// IEEE International Conference on Communications. 2015: 7145-7150.
|
[6] |
Monkey[EB/OL]. .
|
[7] |
MonkeyRunner[EB/OL]. .
|
[8] |
李必信, 李宣东, 郑国梁 . 一种系统依赖图的面向对象扩充方案[J]. 软件学报, 2001,12(2): 241-248.
|
|
LI B X , LI X D , ZHENG G L . An object-oriented extension ap-proach for system dependent graph[J]. Journal of Software, 2001,12(2): 241-248.
|
[9] |
杜林, 江海燕 . 计算面向对象程序切片技术研究[J]. 山东大学学报(工学版), 2008,38(6): 41-47.
|
|
DU L , JIANG H Y . Research on slicing technology of object oriented program[J]. Journal of Shandong University(Engineering Science), 2008,38(6): 41-47.
|
[10] |
AU K W Y , ZHOU Y F , HUANG Z ,et al. PScout:analyzing the Android permission specification[C]// The ACM Conference on Computer and Communications Security. 2012: 217-228.
|
[11] |
MOURA L D , BJORNER N . Z3:an efficient SMT solver[J]. Lecture Notes in Computer Science, 2008,4963: 337-340.
|
[12] |
Apktool[EB/OL]. .
|
[13] |
Androguard[EB/OL]. .
|
[14] |
CHOI S , BIJOU M , SUN K ,et al. API tracing tool for Android-based mobile devices[J]. International Journal of Information and Education Technology, 2015,5(6): 460-465.
|
[15] |
MACHIRY A , TAHILIANI R , NAIK M . Dynodroid:an input generation system for Android apps[C]// Joint Meeting on Foundations of Software Engineering. 2013: 422-434.
|
[16] |
HU C , NEAMTIU I . Automating GUI testing for Android applications[C]// The International Workshop on Automation of Software Test. 2011: 77-83.
|
[17] |
AMALFITANO D , FASOLINO A R , TRAMONTANA P ,et al. Using GUI ripping for automated testing of Android applications[C]// The 27th IEEE/ACM International Conference on Automated Software Engineering,IEEE Computer Society. 2012: 258-261.
|
[18] |
YANG W , PRASAD M R , XIE T . A grey-box approach for automated GUI-model generation of mobile applications[C]// The International Conference on Fundamental Approaches To Software Engineering. 2013: 250-265.
|
[19] |
Robotium[EB/OL]. .
|
[20] |
CHOI W , NECULA G , SEN K . Guided GUI testing of Android Apps with minimal restart and approximate learning[J]. ACM Sigplan Notices, 2013,48(10): 623-640.
|
[21] |
AZIM T , NEAMTIU I . Targeted and depth-first exploration for systematic testing of Android Apps[J]. ACM Sigplan Notices, 2013,48(10): 641-660.
|
[22] |
RASTOGI V , CHEN Y , ENCK W . Appsplayground:automatic security analysis of smartphone applications[C]// ACM Conference on Data and Application Security and Privacy. 2013: 209-220.
|
[23] |
VEEN V V D . Dynamic analysis of Android malware[J]. Internet &Web Technology Master thesis,VU University Amsterdam, 2013.
|
[24] |
LINDORFER M , NEUGSCHWANDTNER M , WEICHSELBAUM L ,et al. ANDRUBIS- -1,000,000 apps later:a view on current Android malware behaviors[C]// The 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security,IEEE Computer Society. 2014: 3-17.
|