[1]Fu Yiang , Zhou Danping. Androids security mechanism analysis[J]. Netinfo Security, 2011 (9): 2325[2]Wang Shifa, Gao Xianqiang, Han Lu. Analysis of the security mechanism of Android and countermeasures[J]. Electronic Test, 2013 (22): 5960[3]Zhu Jiao, Li Hongwei, Peng Xin, et al. On relationship of functions and permissions in Android applications[J]. Computer Applications & Software, 2014, 31(10): 2733[4]Lee HT, Kim D, Park M, et al. Protecting data on android platform against privilege escalation attack[J].International Journal of Computer Mathematics, 2016, 93(2): 401414[5]Cai Luocheng. Discussion on mechanism for backstage monitors of Android[J]. Information Security and Communications Privacy, 2010 (6): 3941[6]Enck W, Gilbert P, Han S, et al. TaintDroid: An informationflow tracking system for realtime privacy monitoring on smartphones[J]. Communications of the ACM, 2010, 57(3): 393407[7]Yang Jing, Jin Weixin, Wu Zuoshun. Research on the scheme of permission management and optimization based on Android system[J]. Electronics Quality, 2015 (3): 48[8]Qiu Lingzhi, Zhang Zixiong, Sun Guozi. InsightDroid—Dynamic method trace in Android applications[J]. Journal of Chinese Computer Systems, 2014, 35(11): 24822487[9]Bartel A, Klein J, Monperrus M, et al. Static analysis for extracting permission checks of a large scale framework: The challenges and solutions for analyzing Android[J]. IEEE Trans on Software Engineering, 2014, 40(6): 617632[10]Chen Weihe, Qiu Daolong. An enhanced Android security mechanism model[J]. Wireless Communication Technology, 2014, 23(1): 3741[11]Enck W, Octeau D, Mcdaniel P, et al. A study of android application security[C] Proc of USENIX Conf on Security. Berkeley: USENIX Association, 2011: 11751175[12]Enck W, Ongtang M, Mcdaniel P. On lightweight mobile phone application certification[C] Proc of ACM Conf on Computer and Communications Security. New York: ACM, 2009: 235245[13]Zhou Yajin, Jiang Xuxiao. Dissecting Android malware: Characterization and evolution[J]. Institute of Electrical and Electronics Engineers Inc, 2012, 4(3): 95109 |