Xihai DENG,Weimiao FENG,Luping MA,Ying LI. A general attack model based on Android system vulnerability[J]. Telecommunications Science, 2016, 32(10): 42-49.
GARTNER . Gartner says worldwide smart phone sales grew 3.9 percent in first quarter of 2016[EB/OL]. (2016-05-19]) [2016-07-01]. .
[2]
CVE. Google android vulnerability statistics[EB/OL]. (2016-07-29]) [2016-07-29]. .
[3]
张嘉宾 . Android 应用的安全性研究[J]. 北京:北京邮电大学, 2013. ZHANG J B . Security research of the Android Apps[J]. Beijing:Beijing University of Posts and Telecommunications, 2013.
[4]
WEI X , GOMEZ L , NEAMTIU I , et al. Permission evolution in the android ecosystem[C]// 28th Annual Computer Security Applications Conference, Dec 3-7,2012, Orlando, Florida, USA. New York:ACM Press, 2012:31-40.
[5]
THOMAS D R , BERESFORD A R , RICE A . Security metrics for the android ecosystem[C]// 5th Annual ACM CCS Workshopon Security and Privacy in Smartphones and Mobile Devices, October 12-15,2015, Denver, Colorado, USA. New York:ACM Press, 2015:87-98.
[6]
CVE. Calculating the score[EB/OL]. [2016-07-29]. .
[7]
Android-VTS. Android vulnerability test suite[EB/OL]. [2016-07-29]. .
[8]
PERLA E , OLDANI M . A guide to Kernel exploitation:attacking the core[M]. New York:Syngress Publishing, 2010.
[9]
蒋绍林, 王金双, 张涛 , 等. Android 安全研究综述[J]. 计算机应用与软件, 2012,29(10):205-210. JIANG S L , WANG J S , ZHANG T , et al. Overview of the Android safety research[J]. Computer Application and Software, 2012,29(10):205-210.