Computer Science ›› 2018, Vol. 45 ›› Issue (2): 203-208.doi: 10.11896/j.issn.1002-137X.2018.02.035
Previous Articles Next Articles
CHEN Wei, YANG Qiu-hui and CHENG Xue-mei
[1] SHABTAI A,FLEDEL Y,KANONOV U,et al.Google An-droid:A Comprehensive Security Assessment[J].IEEE Security &Privacy,2010,8(2):35-44. [2] BHASU A.Security Enhanced Linuses LIDS,TOMOYO andSELINUX[R/OL].[2011-12-15].http://it.toolbox.com/blogs/linux-security/security-enhanced-linuses-lids-tomoyo-and-se_linux-4977. [3] LIU J,SUN K Q,WANG S L.Vulnerability analysis of the Android operating system code based on control flow mining [J].Journal of Tsinghua University(Science and Technology) ,2012,52(10):1335-1339.(in Chinese) 刘剑,孙可钦,汪孙律.基于控制流挖掘的Android系统代码漏洞分析[J].清华大学学报(自然科学版),2012,52(10):1335-1339. [4] COKER R.Porting nsa security enhanced 1inux to handheld devices:Proc of Linux symp[C]∥Ottawa:Linux symp Inc.2003:117. [5] SHABTAI A,FLEDEL Y,ELOVICI Y.Securing Android po-wered mobile devices using SELinux[J].Security & Privacy,2010,8(3):36-44. [6] BUGIEL S,DAVI L,DMITRIENKO A,et al.Practical andlightweight domain isolation on androidd[C]∥Proc of the lst ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York:ACM,2011:51-62. [7] SMANEY S,CRAIG R.Security enhanced(SE) Android:brin-ging flexible MAC to Android[C]∥Proc of the 20th Annual Network and Distributed System Secrity Symp.USA:ANDSSS,2013:1-5. [8] BUGIEL S,HEUSER S,SADEGHI A R.Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies[C]∥USENIX Association.Berkeley:USENIX Association,2013:131-146. [9] DING M,YU L.Design and Implementation of Android OS Security Enhancement Scheme[J].Computer Knowledge and Technology,2015,11(33):19-20.(in Chinese) 丁汨,于琳.Android系统安全增强方案的设计与实现[J].电脑知识与技术,2015,1(33):19-20. [10] LU Y M,LI Y F,YING L Y,et al.Security Analysis and Enhancement of Third-Party Android Push Service[J].Journal of Computer Research and Development,2016,3(11):2431-2445.(in Chinese) 路晔绵,李轶夫,应凌云,等.Android应用第三方推送服务安全分析与安全增强[J].计算机研究与发展,2016,53(11):2431-2445. [11] WAN Y,WANG G L,FENG X Y.An evaluation model for information security of Android application based on analytic hie -rarchy process[C]∥World Automation Congress.USA:WAC,2016:1-6. [12] XU M Z,WUN W Q,ALAM M.Security enhancement of secure USB debugging in Android system[C]∥Consumer Communication and Networking Conference(CCNC).USA:IEEE,2016:134-139. [13] Mergem status[EB/OL].http://seandroid.bitbucket.org/Merge-Status.html. [14] ELECTRONICS S.Samsung KNOX[EB/OL].http://www.samsung.com/global/business/mobile/solution/security/samsung-knox. [15] Knox workspace supported devices[EB/OL].https://www.samsungknox.cn/en/solutions/knox/technical/knoxsupporteddevices. [16] TOMOYO Linux[EB/OL].http://tomoyo.sourceforge.jp. [17] LI F.Analysis and Enhancement of Security Mecha-nism Based on Android OS[D].Wuhan:Huazhong University of Science & Technology,2012.(in Chinese) 李凡.Android系统安全机制的分析与增强[D].武汉:华中科技大学,2012. |
No related articles found! |
|