Computer Science ›› 2017, Vol. 44 ›› Issue (4): 79-81.doi: 10.11896/j.issn.1002-137X.2017.04.017
Previous Articles Next Articles
WAN Yan, ZHAO Xi and WANG Guo-lin
[1] ENCK W,ONGTANG M,MCDANIEL P.Understanding An-droid Security[J].IEEE Security & Privacy Magazine,2009,7(1):50-57. [2] SHABTAI A,FLEDEL Y,KANONOV U,et al.Google An-droid:A Comprehensive Security Assessment[J].IEEE Security & Privacy,2010,8(2):35-44. [3] BARTEL A,KLEIN J,TRAON Y L,et al.Automatically securing permission-based software by reducing the attack surface:an application to Android[C]∥Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.ACM,2012:274-277. [4] HANNA S,HUANG L,WU E,et al.Juxtapp:A Scalable System for Detecting Code Reuse among Android Applications[M]∥Detection of Intrusions and Malware,and Vulnerability Assessment.Springer Berlin Heidelberg,2013:62-81. [5] The MITRE Corporation.OVAL[EB/OL].(2015-07-09)[2015-11-15].http://oval.mitre.org. [6] The MITRE Corporation.CVE[EB/OL].(2015-07-24)[2015-11-15].http://cve.mitre.org. [7] Internet Security SystemsTM.Vulnerability assessment[EB/OL].(2015-07-26)[2015-11-15].http://www.iss.net/find_produ-cts/vulnerability-assessment.php. [8] WANG X D,GAO L,ZHANG L.Design and implementation of OVAL-compatible VAS on multi-platform[J].Computer Engineering and Applications,2009,5(36):82-85.(in Chinese) 王旭冬,高岭,张林.兼容OVAL的多平台VAS设计与实现[J].计算机工程与应用,2009,45(36):82-85. |
No related articles found! |
|