Computer Science ›› 2015, Vol. 42 ›› Issue (11): 191-196.doi: 10.11896/j.issn.1002-137X.2015.11.040
Previous Articles Next Articles
XU Qian and TAN Cheng-xiang
[1] Davi L,Dmitrienko A,et al.Privilege Escalation Attacks on Android[C]∥Proceedings of the 13th International Conference on Information Security.Berlin:Springer-Verlag,2011:346-360 [2] Enck W,Ongtang M,M cdaniel P.On lightweight mobile phone application certification[C]∥ ACM Conference on Computerand Communications Security.New York:ACM,2009:235-245 [3] Felt A P,Chin E,Hanna S,et al.Android permissions demystified[C]∥ Proceedings of the 18th ACM Conference on Compu-ter and Communications Security.Chicago,USA:ACM Press,2011:627-638 [4] Zhang Y,Yang M,et al.Vetting undesirable behaviors in android apps with permission use analysis[C]∥ Proceedings of 20th ACM Conference on Computer and Communications Secu-rity.New York:ACM,2013:611-622 [5] Yan L K,Yin H,et al.Droidscope:Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis[C]∥ Proceedings of 21th USENIX Security Sympo-sium.California:USENIX Association,2012:569-584 [6] Enck W,Gilbert P,Chun B.TaintDroid:An information-flowtracking system for real-time privacy monitoring on smartphones[C]∥ Proceedings of the 9th USENIX Conference on Ope-rating Systems Design and Implementation.New York:ACM,2010:255-270 [7] Tobias M,Dennis G,et al.QuantDroid:Quantitative Approach towards Mitigating Privilege Escalation on Android[C]∥ IEEE ICC 2013-Communication and Information Systems Security Symposium.German:ICC,2013:2144-2149 [8] Christodorescu M,Jha S,et al.Semantics-aware malware detection[C]∥ Proceedings of the 2005 IEEE Symposium on Security and Privacy.Oakland:IEEE,2005:32-46 [9] Rastogi V,Chen Y,et al.Droidchameleon:evaluating androidanti-malware against transformation attacks[C]∥ Proceedings of the 8th ACM SIGSAC symposium on Information,Computer and Communications Security.New York:ACM,2013:329-334 [10] 彭国军,李晶雯,等.Android恶意软件检测研究与进展[J].武汉大学学报,2015,61(1):21-33 Peng G J,Li J W,et al.Android Malware Detection Research and Development[J].Journal of Wuhan University,2015,61(1):21-33 [11] Felt AP,Wang H J,Moshchuk A,et al.Permission re-delegation:Attacks and defenses[C]∥ Proceedings of the 20th USENIX Security Symposium.Berkeley,CA:USENIX Association,2011:22-37 [12] Bugiel S,Davi L,Dmitrienko A,et al.XManDroid:A new Android evolution to mitigate privilege escalation attacks[R].Darmstadt Technical University:System Security Lab,2011 [13] Bugiel S,Davi L,Dmitrienko A,et al.Towards taming and privilege-escalation attacks on Android[EB/OL].[2012-07-02].http://www.trust.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/pubsPDF/NDSS_2012_Towards_Taming_Privilege-Escalation_Attacks_on_Android.pdf [14] 蒋绍林,王金双,于晗,等.改进的Android强制访问控制模型[J].计算机应用,2013,33(6):1630-1636 Jiang S L,Wang J S,Yu H,et al.Improved mandatory access control model for Android[J].Journal of Computer Applications,2013,33(6):1630-1636 [15] Nauman M,Khan S.Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform[J].International Journal of Advanced Information Technology,2011,2(8):440-448 [16] Schreckling D,Posegga J,et al.Kynoid:Real-Time Enforcement of Fine-Grained,User-Defined,and Data-Centric Security Policies for Android[C]∥ Proceedings of 6th IFIP WG 11.2 International Workshop.UK:WISTP,2012:208-223 [17] Wang H,Sun L,et al.Building access control policy model for privacy preserving and testing policy conflicting problems[J].Journal of Computer and System Sciences,2013,8(80):1493-1503 [18] Roman S,Zhang K H,et al.Soundcomber:A stealthy and context-aware sound Trojan for smartphones[J/OL].[2011-05-15].http://www.isoc.org/isoc/conferen-ces/ndss/11/pdf/1_1.pdf |
No related articles found! |
|