JESSE B . Developing secure mobile application for Android[EB/OL] , 2008.
[2]
SCHMIDT A D , SCHMIDT H G , BATYUK L . Smartphone malware evolution revisited: Android next target[A]. Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software[C]. USA, 2009. 1-7.
[3]
SCHMIDT A D , SCHMIDT H G , CLAUSEN J . Static analysis of executables for collaborative malware detection on android[A]. IEEE International Congress on Communication (ICC) 2009 - Communica-tion and Information Systems Security Symposium[C]. 2009.
[4]
ENCK W , ONGTANG M , MCDANIEL P . Understanding Android security[J]. IEEE Security and Privacy, 2009,7(1): 50-57.
[5]
SHABTAI A , FLEDEL Y , ELOVICI Y . Securing android-powered mobile devices using selinux[J]. IEEE Security and Privacy[C]. 2009. 10-15.
[6]
BERGERON J , DEBBABI M , DESHARNAIS J . Static detection of malicious code in executable programs[A]. Proceedings of the Sym-posium on Requirements Engineering for Information Security[C]. USA, 2001. 20-24.
[7]
MOSER A , KRUEGEL C , KIRDA E . Limits of static analysis for malware detection[A]. Proceedings of the 23rd Annual Computer Se-curity Application Conference[C]. Seoul, Korea, 2007. 421-430.
[8]
BISHOP M A . The Art and Science of Computer Security[M]. Boston:Addison-Wesley Longman Publishing Co, 2002. 213-217.