参考文献
[1]Google Inc..Android Security Overview[EB/OL].[2015-03-15].https://source.android.com/devices/tech/security/index.html.
[2]Enck W,Ongtang M,McDaniel P.Understanding Android Security[J].IEEE Security & Privacy,2009,7(1):50-57.
[3]Tan D J J,Chua T W,Thing V L L.Securing Android:A Survey,Taxonomy,and Challenges[J].ACM Com-puting Surveys,2015,47(4):1-45.
[4]张玉清,王凯,杨欢,等.Android安全综述[J].计算机研究与发展,2014,51(7):1385-1396.
[5]Smalley S,Craig R.Security Enhanced(SE) Android:Bringing Flexible MAC to Android[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:ISOC,2013:20-38.
[6]Shebaro B,Oluwatimi O,Bertino E.Context-based Access Control Systems for Mobile Devices[J].IEEE Transactions on Dependable and Secure Computing,2015,12(2):150-163.
[7]杨欢,张玉清,胡予濮,等.基于权限频繁模式挖掘算法的 Android 恶意应用检测方法[J].通信学报,2013,34(1):106-115.
[8]Wang Wei,Wang Xing,Feng Dawei,et al.Exploring Permission-induced Risk in Android Applications for Malicious Application Detection[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1869-1882.
[9]Lu Long,Li Zhichun,Wu Zhenyu,et al.CHEX:Statically Vetting Android Apps for Component Hijacking Vulnerabilities[C]//Proceedings of 2012 ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2012:229-240.
[10]Arzt S,Rasthofer S,Fritz C,et al.FlowDroid:Precise Context,Flow,Field,Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps[C]//Pro-ceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation.New York,USA:ACM Press,2014:29-35.
[11]Enck W,Gilbert P,Han S,et al.TaintDroid:An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones[J].ACM Transactions on Computer Systems,2014,32(2):5-10.
[12]Tang Y,Ames P,Bhamidipati S,et al.CleanOS:Limiting Mobile Data Exposure with Idle Eviction[C]//Proceedings of Symposium on Operating System Design and Implementation.Berkeley,USA:USENIX Associa-tion,2012:77-91.
[13]Qian Chenxiong,Luo Xiapu,Shao Yuru,et al.On Tracking Information Flows Through JNI in Android Applications[C]//Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Washington D.C.,USA:IEEE Press,2014:180-191.
[14]Luo Tongbo,Hao Hao,Du Wenliang,et al.Attacks on WebView in the Android System[C]//Proceedings of the 27th Annual Computer Security Applications Con-ference.New York,USA:ACM Press,2011:343-352.
[15]Yu Jing,Yamauchi T.Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS[C]//Proceedings of IEEE International Conference on High Performance Computing & Communications.Washington D.C.,USA:IEEE Press,2013:1628-1633.
[16]Georgiev M,Jana S,Shmatikov V.Breaking and Fixing Origin-based Access Control in Hybrid Web/Mobile Application Frameworks[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:ISOC,2014:1-8.
[17]Oracle Inc..Trail:The Reflection API[EB/OL].[2015-03-15].https://docs.oracle.com/javase/tutorial/reflect/.
[18]Tutorialspoint.Java.lang.Throwable.get Stack Trace() Method[EB/OL].[2015-03-15].http://www.tutorial spoint.com/java/lang/throwable_getstacktrace.htm.
编辑陆燕菲 |