共 39 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
[Anonymous], 2011, USENIX SECURITY S
[3]
[Anonymous], 2012, P 10 INT C MOB SYST
[4]
[Anonymous], 2012, MOB THREAT REP 2012 MOB THREAT REP 2012
[5]
[Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
[6]
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[7]
[Anonymous], 2014, Communications of the ACM, DOI DOI 10.1145/2494522
[8]
[Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
[9]
[Anonymous], 2011, SECURITY ALERT GOLDD
[10]
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:73-84