Android Security Permissions - Can We Trust Them?
暂无分享,去创建一个
Stefan Kraxberger | Peter Teufl | Clemens Orthacker | Günther Lackner | Michael Gissing | Alexander Marsalek | Johannes Leibetseder | Oliver Prevenhueber | Stefan Kraxberger | Peter Teufl | Clemens Orthacker | G. Lackner | Michael Gissing | Alexander Marsalek | Johannes Leibetseder | Oliver Prevenhueber
[1] Patrick D. McDaniel,et al. Semantically rich application-centric security in Android , 2012 .
[2] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[3] Rebecca Montanari,et al. What's on Users' Minds? Toward a Usable Smart Phone Security Model , 2009, IEEE Pervasive Computing.
[4] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[5] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.