[1] Hornyack P, Han S, Jung J, et al. These Aren’t the Droids You’re Looking for: Retrofitting Android to Protect Data from Imperious Applications[C]//Proc. of CCS’11. Chicago, USA: [s. n.], 2011.
[2] Enck W, Gilbert P, Chun B, et al. TaintDroid: An Informa- tion-flow Tracking System for Realtime Privacy Monitoring on Smartphones[C]//Proc. of OSDI’10. Vancouver, Canada: [s. n.], 2010.
[3] Beresford A R, Rice A, Skehin N, et al. MockDroid: Trading Privacy for Application Functionality on Smartphones[C]//Proc. of the 12th Workshop on Mobile Computing Systems and Appli- cations. Phoenix, USA: [s. n.], 2011.
[4] Enck W, Octeau D, McDaniel P, et al. A Study of Android Application Security[C]//Proc. of the 20th USENIX Security Symposium. San Francisco, USA: [s. n.], 2011.
[5] Goldberg I, Wagner D, Thomas R, et al. A Secure Environment for Untrusted Helper Applications(Confining the Wily Hacker)[C]// Proc. of the 6th USENIX UNIX Security Symposium. San Jose, California, USA: [s. n.], 1996.
[6] Sabelfeld A, Myers A C. Language-based Information-flow Secu- rity[J]. IEEE Journal on Selected Areas in Communications, 2003, 21(1): 5-19.
[7] Ligatti J, Bauer L, Walker D. Edit Automata: Enforcement Me- chanisms for Run-time Security Policies[J]. International Journal of Information Security, 2005, 4(1-2): 2-16.
[8] Wang Tielei, Wei Tao, Gu Guofei, et al. TaintScope: A Checksum- aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection[C]//Proc. of the 31st IEEE Symposium on Security & Privacy. Berkeley, USA: [s. n.], 2010.
[9] Enck W. Defending Users Against Smartphone Apps: Techniques and Future Directions[C]//Proc. of ICISS’11. Kolkata, India: [s. n.], 2011.
[10] 曾健平, 邵艳洁. Android系统架构及应用程序开发研究[J]. 微计算机信息, 2011, 27(9): 1-3.
[11] Gilbert P, Chun B, Cox L P, et al. Vision: Automated Security Validation of Mobile Apps at App Markets[C]//Proc. of MCS’11. Washington D. C., USA: [s. n.], 2011. |