[1] 中国消费者协会. App个人信息泄露情况调查报告[EB/OL].2018-08-29[2019-06-09]. http://www.cca.org.cn/jmxf/detail/28180.html.
[2] Slavin R, Wang X, Hosseini M B, et al. Toward a Framework for Detecting Privacy Policy Violations in Android Application Code[C]//Proceedings of the 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016: 25–36.
[3] Yu L, Luo X, Liu X, et al. Can We Trust the Privacy Policies of Android Apps?[C]//2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2016: 538–549.
[4] Enck W, Ongtang M, Mcdaniel P. On Lightweight Mobile Phone Application Certification[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2009: 235–245.
[5] Hamed A, Kaffel Ben Ayed H. Privacy risk assessment and users’ awareness for mobile apps permissions[C]//2016: 1–8.
[6] Hamed A, Ayed H K-B, Machfar D. Assessment for Android apps permissions a proactive approach toward privacy risk[C]//2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 2017: 1465–1470.
[7] Wei M, Gong X, Wang W. Claim What You Need: A Text-Mining Approach on Android Permission Request Authorization[C]//2015 IEEE Global Communications Conference (GLOBECOM). 2015: 1–6.
[8] 张贤贤, 王浩宇, 郭耀, 等. 基于众包和机器学习的移动应用隐私评级研究[J]. 计算机科学与探索, 2018, 12(08): 1238–1251.
[9] Felt A P, Chin E, Hanna S, et al. Android permissions demystified[J]. Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11, 2011: 627.
[10] Au K W Y, Zhou Y F, Huang Z, et al. PScout: Analyzing the Android Permission Specification[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2012: 217–228.
[11] Rosen S, Qian Z, Mao Z M. AppProfiler: A Flexible Method of Exposing Privacy-related Behavior in Android Applications to End Users[C]//Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2013: 221–232.
[12] Enck W, Gilbert P, Chun B-G, et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones[J]. ACM Transactions on Computer Systems (TOCS), 2010, 32(2): 5.
[13] Le A, Varmarken J, Langhoff S, et al. AntMonitor: A System for Monitoring from Mobile Devices[C]//Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data. New York, NY, USA: ACM, 2015: 15–20.
[14] Zang J, Dummit K, Graves J, et al. Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps[J]. Technology Science, 2015.
[15] COMMISSION NATIONALE DE L’INFORMATIQUE ET DES LIBERTÉS. Publication : EBIOS — Expression des Besoins et Identification des Objectifs de Sécurité[EB/OL]. ANSSI, [2019-03-05]. https://www.ssi.gouv.fr/guide/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite/.
[16] Mylonas A, Theharidou M, Gritzalis D. Assessing Privacy Risks in Android: A User-Centric Approach[C]//Risk Assessment and Risk-Driven Testing. Springer, Cham, 2013: 21–37.
|