参考文献 [1]Gartner February Report[EB/OL].[2016-02-18].http://www.gartner.com/newsroom/id/3215217. [2]李静华,慕德俊,杨鸣坤,等.Android恶意程序行为分析系统设计[J].北京邮电大学学报,2014,37(增刊):104-107. [3]ELISH K O,SHU X,YAO D,et al.Profiling User-trigger Dependence for Android Malware Detection[J].Computers & Security,2015,49(1):255-273. [4]WEN W P,RUI M,GE N,et al.Malware Detection Technology Analysis and Applied Research of Android Platform[J].Journal on Communications,2014(8):78-85. [5]腾讯移动实验室2016年安全报告[EB/OL].[2016-08-16].http://www.199it.com/archives/507461.html. [6]PROTSENKO M,MULLER T.Android Malware Detection Based on Software Complexity Metrics[C]//Proceedings of Trust,Privacy,and Security in Digital Business.Berlin,Germany:Springer,2014:24-35. [7]DESHOTELS L,NOTANI V,LAKHOTIA A.DroidLegacy:Automated Familial Classification of Android Malware[C]//Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop.New York,USA:ACM Press,2014:1-12. [8]LI T,HANG D,YUAN C,et al.Description of Android Malware Feature Based on Dalvik Instructions[J].Journal of Computer Research & Development,2014,51(7):1458-1466. [9]JIANG S.A Summary on Android Security[J].Computer Applications & Software,2012,29(10):205-210. [10]张玉清,王凯,杨欢,等.Android安全综述[J].计算机研究与发展,2014,51(7):1385-1396. [11]卿斯汉.Android安全研究进展[J].软件学报,2016,27(1):45-71. [12]ZHANG Y,KAI W,YANG H,et al.Survey of Android OS Security[J].Journal of Computer Research & Development,2014,51(7):1385-1396. [13]FANG Z,HAN W,LI Y.Permission Based Android Security:Issues and Countermeasures[J].Computers & Security,2014,43(6):205-218. [14]MOONSAMY V,RONG J,LIU S.Mining Permission Patterns for Contrasting Clean and Malicious Android Applications[J].Future Generation Computer Systems,2014,36(3):122-132. [15]HOLAVANALLI S,MANUEL D,NANJUNDASWAMY V,et al.Flow Permissions for Android[C]//Proceedings of IEEE International Conference on Automated Software Engineering.Washington D.C.,USA:IEEE Press,2013:652-657. [16]FELT A P,CHIN E,HANNA S,et al.Android Permissions Demystified[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2011:627-638. [17]YANG Z,YANG M.LeakMiner:Detect Information Leakage on Android with Static Taint Analysis[J].Software Engineering,2013,18(20):101-104. [18]BUGIEL S,DAVI L,DMITRIENKO A,et al.Practical and Lightweight Domain Isolation on Android[C]// Proceedings of ACM Workshop on Security and Privacy in Smart Phones and Mobile Devices.New York,USA:ACM Press,2011:51-62. [19]ENCK W,GILBERT P,HAN S,et al.TaintDroid:An Information-flow Tracking System for Realtime Privacy Monitoring on Smart Phones[J].ACM Transactions on Computer Systems,2014,32(2):393-407. [20]LANGE M,LIEBERGELD S,LACKORZYNSKI A,et al.L4Android:A Generic Operating System Framework for Secure Smart Phones[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smart Phones and Mobile Devices.New York,USA:ACM Press,2011:39-50. [21]SUN Q,QI T,YANG T,et al.An Android Dynamic Data Protection Model Based on Light Virtualization[C]// Proceedings of IEEE International Conference on Communication Technology.Washington D.C.,USA:IEEE Press,2013:65-69. [22]卿斯汉,李丽萍,何建波,等.基于DTE策略的安全域隔离Z形式模型[J].计算机研究与发展,2007,44(11):1881-1888. [23]Pendragon Software Corporation.CaffeineMark3.0 [EB/OL].[2016-08-01].http://www.benchmarkhq.ru/cm30/. [24]AnTuTu Benchmark Home Page[EB/OL].[2016-07-22].http://www.antutu.com/en/index.shtml. 编辑索书志 |