共 16 条
[1]
A look at smartphone permission models. Au K,Zhou B,Huang Z,et al. Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices . 2011
[2]
Using Static Analysis for AutomaticAssessment and Mitigation of Unwanted and Malicious Activities Within Android Applications. Leonid Batyuk,Markus Herpich,Seyit Ahmet Camtepe. Proceeding of the6th International Conference on Malicious and Unwanted Software . 2011
[3]
Android permissions demystified. Felt A P,Chin E,Hanna S,et al. ACM Conference onComputer and Communications Security . 2011
[4]
Static analysis of Android programs. Payet E,Spoto F. Automated Deduction-CADE-23 . 2011
[5]
基于模糊测试的软件安全漏洞发掘技术研究[D]. 黄奕.中国科学技术大学 2010