[1] |
McaAfee Research Institute. . McAfee labs threats report[R]. 2016: 1-53.
|
[2] |
FELT A P , WANG H J , MOSHCHUK A ,et al. Permission re-delegation:attacks and defenses[C]// USENIX Security Symposium. 2011: 30-31.
|
[3] |
WU L , DU X , ZHANG H . An effective access control scheme for preventing permission leak in Android[C]// 2015 International Computing,Networking and Communications Conference. 2015: 57-61.
|
[4] |
BLASCO J , CHEN T M . Automated generation of colluding apps for experimental research[J]. Journal of Computer Virology and Hacking Techniques, 2017,36(17): 1-12.
|
[5] |
ARZT S , RASTHOFER S , FRITZ C ,et al. Flowdroid:Precise context,flow,field,object-sensitive and lifecycle-aware taint analysis for android apps[J]. ACM Sigplan Notices, 2014,49(6): 259-269.
|
[6] |
ASAVOAE I M , NGUYEN H N , ROGGENBACH M ,et al. Utilising semantics for collusion detection in Android applications[C]// International Workshop on Formal Methods for Industrial Critical Systems. 2016: 142-149.
|
[7] |
BOSU A , LIU F , YAO D ,et al. Collusive data leak and more:Large-scale threat analysis of inter-app communications[C]// 2017 ACM Conference on Computer and Communications Security. 2017: 71-85.
|
[8] |
WEI F , ROY S , OU X . Amandroid:a precise and general inter-component data flow analysis framework for security vetting of android apps[C]// 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 1329-1341.
|
[9] |
LI L , BARTEL A , BISSYANDE T F ,et al. ApkCombiner:combining multiple android appsto support inter-app analysis[C]// IFIP International Information Security Conference. 2015: 513-527.
|
[10] |
SCHLEGEL R , ZHANG K , ZHOU X ,et al. Soundcomber:a stealthy and context-aware sound trojan for smartphones[C]// The 2015 Network and Distributed System Security Conference. 2011: 17-33.
|
[11] |
BARTEL A , KLEIN J , LE TRAON Y ,et al. Automatically securing permission-based software by reducing the attack surface:An application to android[C]// The 27th ACM International Conference on Automated Software Engineering. 2012: 274-277.
|
[12] |
SADEGHI A , BAGHERI H , MALEK S . Analysis of android inter-app security vulnerabilities using COVERT[C]// The 37th IEEE International Conference on Software Engineering. 2015: 725-728.
|
[13] |
MERCALDO F , VISAGGIO C A , CANFORA G ,et al. Mobile malware detection in the real world[C]// ACM International Conference on Software Engineering. 2016: 744-746.
|
[14] |
KALUTARAGE H K , LEE C , SHAIKH S A ,et al. Towards an early warning system for net work attacks using bayesian inference[C]// 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing. 2015: 399-404.
|
[15] |
SCHAPIRE R E . Explaining adaboost[M]. Berlin,Germany: Springer-VerlagPress, 2013: 37-52.
|
[16] |
GILL A . Introduction to the theory of finite-state machines[J]. Mathematics of Computation, 1964,92(29): 63-74.
|
[17] |
MCLLROY S , ALI N , HASSAN A E . Fresh apps:an empirical study of frequently-updated mobile apps in the Google play store[J]. Empirical Software Engineering, 2016,21(3): 1346-1370.
|
[18] |
CHO T , KIM H , LEE J ,et al. A scheme for identifying malicious applications based on API characteristics[J]. Journal of the Korea Institute of Information Security and Cryptology, 2016,26(1): 187-196.
|
[19] |
KIM H , CHO T , AHN G J ,et al. Risk assessment of mobile applications based on machine learned malware dataset[J]. Multimedia Tools and Applications, 2017,35(23): 1-16.
|
[20] |
AGRAWAL A , SIMON G , KARSAI G . Semantic translation of Simulink/Stateflow models to hybrid automata using graph transformations[J]. Electronic Notes in Theoretical Computer Science, 2004,109(11): 43-56.
|
[21] |
DHAVALE S , LOKHANDE B . Comnoid:information leakage detection using data flow analysis on Android devices[J]. International Journal of Computer Applications, 2016,134(7): 1-18.
|
[22] |
OCTEAU D , LUCHAUP D , DERING M ,et al. Composite constant propagation:application to android inter-component communication analysis[C]// The 37th International Conference on Software. 2015: 77-88.
|
[23] |
BOSU A , LIU F , YAO D D ,et al. Collusive data leak and more:large-scale threat analysis of inter-app communications[C]// The 2017 ACM on Asia Conference on Computer and Communications Security. 2017: 71-85.
|
[24] |
GORDON M I , KIM D , PERKINS J H ,et al. Information flow analysis of Android applications in DroidSafe[C]// 2015 Network and Distributed System Security Conference. 2015: 1-16.
|