共 8 条
[1]
Taming information-stealing Smartphone applications (on Android). Y.Zhou,X.Zhang,X.Jiang,VW Freeh. Proceedings of the4th International Conference on Trust and Trustworthy Computing . 2011
[2]
A methodology for empirical analysis of permission-based security models and its application to android. David Barrera,Hilmi Günes Kayacik,Paul C van Oorschot,Anil Somayaji. ACM Conference on Computer and Communications Security . 2010
[3]
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework. Shin, Wook,Kiyomoto, Shinsaku,Fukushima, Kazuhide,Tanaka, Toshiaki. IEEE International Conference on Social Computing (SocialCom 2010) . 20111
[4]
A small but non-negligible aw in the Android permission scheme. Wook Shin,Sanghoon Kwak,Shinsaku Kiyomoto,Kazuhide Fukushima,Toshiaki Tanaka. Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks . 2010
[5]
Hey,You,Get Off My Market:Detecting Malicious Apps in Alternative Android Markets. Y.Zhou,Z.Wang,W.Zhou,X.Jiang. Proceedings of the 16th Network and Distributed System Security Symposium . 2012
[6]
Android Permissions Demystified. A.P.Felt,E.Chin,S.Hanna,D.Song,D.Wagner. Proceedings of the18th ACM Conference on Computer and Communications Security,CCS’’11 . 2011
[7]
"Privilege escalation attacks on android,". L.Davi,A.Dmitrienko,A.-R.Sadeghi,M.Winandy. Proceedings of the 13th international conference on Information security, ser.ISC’’10 . 2011
[8]
On Lightweight Mobile Phone Application Certification. W.Enck,M.Ongtang,P.McDaniel. Proceedings of the16th ACM Conference on Computer and Communications Security,CCS’’09 . 2009