Computer Science ›› 2013, Vol. 40 ›› Issue (Z11): 228-234.
Previous Articles Next Articles
LIU Yang,SHAO Xu-dong,PAN Cheng-da and HU Zheng-Liang
[1] Llamas R,Restivo K,Shirer M.Android Marks Fourth Anniversary Since Launch with 75.0% Market Share in Third Quarter[EB/OL].https://www.idc.com/getdoc.jsp?containerId=prUS23771812,IDC,2012 [2] Kleidermacher D,Kleidermacher M.Embedded System Security Practical Methods for Safe And Secure Software and Systems Development [M].Waltham,MA,USA:Elsevier Inc,2012:4-24 [3] Armando A,Merlo A,Verderame L,et al.An Empirical Evaluation of the Android Security Framework [C]∥Proceedings of the 28th IFIP TC-11International Information Security and Privacy Conference (SEC 2013).Auckland:Springer,2013:176-189 [4] Smalley S,Craig R.Security Enhanced (SE) Android:Bringing Flexible MAC to Android [C/OL].http://selinuxproject.Org/~se-android/papers/NDSS2013-SEAndroid-Paper.pdf,NDSS,2013 [5] Jhswx84.SELinux详解[M/OL].http://wenku.baidu.com/view/ 4d26594fc850ad02de804189.html,Baidu,2012 [6] Enck W,Ongtang M,McDaniel P.Understanding Android security [J].IEEE Security and Privacy Magazine,20097(1):50-57 [7] Sally.SELinux学习笔记[M/OL].http://wenku.it168.com/ d_001220063.shtml.IT168,2013 [8] Spencer R,Smalley S,Loscocco P,et al.The Flask security architecture:System support for diverse security policies [C]∥Proceedings of The Eighth USENIX Security Symposium.Washington:USENIX,1999:123-139 [9] Carter J.Using gconf as an example of how to create an userspace object manager[C/OL].http://www.nsa.gov/re search/_files/selinux/papers/gconf07-paper.shtml,NSA,2009 [10] NSA.SE For Android[EB/OL].http://selinuxproject.org/page/ SEforAndroid.NSA,2013 [11] Ongtang M,McLaughlin M,Enck W,et al.Semantically rich application-centric security in Android[J].Security and Communication Networks,2012,5(6):658-673 [12] Bugiel S,Davi L,Dmitrienko A,et al.Practical and Lightweight Domain Isolation on Android[C]∥Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices(SPSM ''11).New York:CCS,2011:51-62 [13] Enck I,Gilbert P,Chun B,et al.TaintDroid:An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones[C]∥proceeding of:9th USENIX Symposium on Operating Systems Design and Implementation,OSDI 2010.Vancouver,BC,Canada:USENIX,2010:1-6 [14] Bugiel S,Davi L,Dmitrienko A,et al.Towards Taming Privilege-Escalation Attacks on Android [C/OL].http://www.trust.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/PubsPDF/NDSS_2012_Towards_Taming_Privilege-Escalation_Attacks_on_Android.pdf,NDSS,2012 [15] Bea F.WhatsApp reads your phone contacts and is breaking pri-vacy laws[CP/OL].http://www.digitaltrends.com/mobile/ whatsapp-breaks-privacy-laws/,DTDigital Trends,2013 [16] Cai H,Shao Z,Vaynberg A.Certified Self-Modifying Code [C]∥Proceedings of 2007ACM SIGPLAN Conference on Programming Language Design and Implementation.San Diego:PLDI’ 2007:66-77 [17] AnTuTu Labs.AnTuTu Benchmark[CP/OL].https://play.google.com/store/apps/details?id=com.antutu.ABenchMark,Google,2013 |
No related articles found! |
|