A novel approach to restrict the access of malicious applications in android
暂无分享,去创建一个
[1] Rafael Fedler,et al. Android oS Security : riSkS And LimitAtionS A PrActicAL evALuAtion , 2012 .
[2] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[3] Yuval Elovici,et al. Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.
[4] Julian Schütte,et al. On the Effectiveness of Malware Protection on Android An evaluation of Android antivirus , 2013 .
[5] Toshiaki Tanaka,et al. A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework , 2010, 2010 IEEE Second International Conference on Social Computing.
[6] Toshiaki Tanaka,et al. Towards Formal Analysis of the Permission-Based Security Model for Android , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.
[7] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[8] Daniel Bilar,et al. Opcodes as predictor for malware , 2007, Int. J. Electron. Secur. Digit. Forensics.
[9] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[10] Johan Gunnarsson,et al. Text mining of personal communication , 2010, 2010 14th International Conference on Intelligence in Next Generation Networks.
[11] Masakatsu Nishigaki,et al. A Proposal to Realize the Provision of Secure Android Applications -- ADMS: An Application Development and Management System , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[12] Evgenios Konstantinou,et al. Metamorphic Virus: Analysis and Detection , 2008 .
[13] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[14] Eleazar Aguirre Anaya,et al. Security controls for Android , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
[15] Toshiaki Tanaka,et al. A Small But Non-negligible Flaw in the Android Permission Scheme , 2010, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks.