Computer Science ›› 2020, Vol. 47 ›› Issue (2): 262-268.doi: 10.11896/jsjkx.190100117
• Information Security • Previous Articles Next Articles
SU Xiang,HU Jian-wei,CUI Yan-peng
CLC Number:
[1]PAKW,CHA Y,YEO S.Detecting and tracing leaked private phone number data in Android smartphones[C]∥International Conference on Information Networking(ICOIN).IEEE,2015:503-508. [2]ZHENG M,SUN M,LUI J C S.DroidTrace:A ptrace based Android dynamic analysis system with forward execution capability[C]∥Wireless Communications and Mobile Computing Confe-rence (IWCMC).IEEE,2014:128-133. [3]SHEN K,YE X J,LIU X N,LI B.Android App behavior-intent inference based on API usage analysis[J].Journal of Tsinghua University,2017,57(11):1139-1144. [4]ARZT S,RASTHOFER S,FRITZ C,et al.Flowdroid:Precise context,flow,field,object-sensitive and lifecycle-aware taint analysis for android apps[J].Acm Sigplan Notices,2014,49(6):259-269. [5]ENCK W,GILBERT P,HAN S,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J].ACM Transactions on Computer Systems (TOCS),2014,32(2):5-34. [6]REINA A,FATTORI A,CAVALLARO L.A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors.EuroSec,April,2013. [7]FAN W,SANG Y,ZHANG D,et al.DroidInjector:A process injection-based dynamic tracking system for runtime behaviors of Android applications[J].Computers & Security,2017,70:224-237. [8]YANG C,XU Z Y,GU G F,et al.DroidMiner:Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications[C]∥European Symposium on Research in Computer Security.2014:163-182. [9]SCHREIBER T.Android BinderAndroid Interprocess Communication∥Seminar thesis,Ruhr-Universität Bochum,2011. [10]CONSTANTINESCU A S.Ensuring privacy in the android os by hooking methods in its api[J].Journal of Mobile,Embedded and Distributed Systems,2015,7(3):107-112. [11]CHEN X Y,WANG D Q.Research and Implementation of Android Proxy Based on Dynamic Agent [J].Industrial Control Computer,2017(7):99-100. [12]JI S B.Basic principles of VirtualApp[EB/OL].http://rk700.github.io/2017/03/15/virtualapp-basic/. [13]JIA P,HE X,LIU L,et al.A framework for privacy information protection on Android[C]∥2015 International Conference on Computing,Networking and Communications (ICNC).IEEE,2015:1127-1131. [14]WIβFELD M.ArtHook:Callee-side Method Hook Injection on the New Android Runtime ART.Saarbrücken:Saarland University,2015. [15]WEI S.AOP implementation on ART [EB/OL].http://wei-shu.me/2017/11/23/dexposed-on-art/. [16]JIANG X,ZHANG H X,MU D J A Method for Dynamically Monitoring Android Applications [J].Journal of Northwestern Polytechnical University,2016,34(6):1074-1081. [17]vul_wish.Inspeckage-Android Package Inspector[EB/OL].https://www.freebuf.com/sectool/98607.html. [18]vul_wish.Inspeckage:安卓动态分析工具[EB/OL].https://www.freebuf.com/sectool/98607.html. [19]Tencent.GT[EB/OL].https://gt.qq.com/index.html. |
[1] | DENG Zhao-kun, LU Yu-liang, ZHU Kai-long, HUANG Hui. Symbolic Execution Technology Based Defect Detection System for Network Programs [J]. Computer Science, 2018, 45(11A): 325-329. |
[2] | SUN Ya-jing, ZHAO Xu, YAN Xue-xiong and WANG Qing-xian. Data Leakage Oriented Testing Method for Web Sandbox [J]. Computer Science, 2017, 44(Z11): 322-328. |
[3] | DIAO Ming-zhi, ZHOU Yuan, LI Zhou-jun and ZHAO Yu-fei. Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine [J]. Computer Science, 2017, 44(11): 246-252. |
[4] | SONG Dao-yuan and BEN Ke-rong. Research and Design of Java Exception Information Analysis Plugin [J]. Computer Science, 2014, 41(8): 106-108. |
[5] | BAO Ai-hua,YUAN Xiao-ping,CHEN Feng and MIAO Jia-jia. Secure Private Cloud Storage System Based on Virtual Isolation Mechanism [J]. Computer Science, 2014, 41(1): 202-207. |
[6] | . Malware Detection Model Based on the Sandbox [J]. Computer Science, 2012, 39(Z6): 12-14. |
[7] | . Research in Monitoring Performance of Disk in Windows NT System [J]. Computer Science, 2012, 39(Z11): 301-304. |
[8] | MENG Chen. Web Browser Vulnerability Exploitation Attack Test Technology Based on Code Overriding [J]. Computer Science, 2011, 38(Z10): 41-43. |
[9] | GONG Guang,LI Zhou-jun,HU Chao-jian,ZOU Yun-ke,LI Zhi-peng. Research on Stealth Technology of Windows Kernel-level Rootkits [J]. Computer Science, 2010, 37(4): 59-. |
[10] | MAO Fei-Qiao ,QI De-Yu (College of Computer Science & Engineering, South China Univ. of Tech., Guangzhou 510640). [J]. Computer Science, 2008, 35(4): 268-272. |
[11] | ZHANG Xin-Lin (Luoding Polytechnic, Luoding 527200). [J]. Computer Science, 2008, 35(3): 289-291. |
[12] | . [J]. Computer Science, 2008, 35(12): 229-233. |
[13] | HAN Hong , LU Xian-Liang, REN Li-Yong , YANG-Ning (Computer Science Department of UESTC, Chengdu 610054). [J]. Computer Science, 2006, 33(3): 105-107. |
|