[1] WANG Y, HARIHARAN S, ZHAO C, et al. Compac: enforce component-level access control in Android[C]//Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2014:25-36. [2] STACH C, MITSCHANG B. Privacy management for mobile platforms-a review of concepts and approaches[C]//Proceedings of the 14th IEEE International Conference on Mobile Data Management. Piscataway: IEEE Press, 2013,1:305-313. [3] BAI G, GU L, FENG T, et al. Context-aware usage control for Android[M]//JAJODIA S, ZHOU J. Security and Privacy in Communication Networks. Berlin: Springer, 2010,50:326-343. [4] NAUMAN M, KHAN S, ZHANG X. Apex: extending Android permission model and enforcement with user-defined runtime constraints[C]//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2010:328-332. [5] de MELO L L, ZORZO S D. PUPDroid-personalized user privacy mechanism for Android[C]//Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Piscataway: IEEE Press, 2012:1479-1484. [6] KAUR A, UPADHYAY D. PeMo: modifying application's permissions and preventing information stealing on smartphones[C]//Proceedings of the 5th International Conference-Confluence the Next Generation Information Technology Summit. Piscataway: IEEE, 2014: 905-910. [7] ROSEN S, QIAN Z, MAO Z M. AppProfiler: a flexible method of exposing privacy-related behavior in Android applications to end users[C]//Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. New York: ACM, 2013:221-232. [8] JING Y, AHN G J, ZHAO Z, et al. RiskMon: continuous and automated risk assessment of mobile applications[C]//Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2014:99-110. [9] RASSAMEEROJ I, TANAHASHI Y. Various approaches in analyzing Android applications with its permission-based security models[C]//Proceedings of the 2011 IEEE International Conference on Electro/Information Technology. Piscataway: IEEE Press, 2011:1-6. [10] JIANG D Y, FU X L, SONG M Q, et al. A security assessment method for Android applications based on permission model[C]//Proceedings of the 2nd International Conference on Cloud Computing and Intelligence Systems. Piscataway: IEEE Press, 2012:701-705. [11] LEE S, JU D Y. Assessment of malicious applications using permissions and enhanced user interfaces on Android[C]//Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics. Piscataway: IEEE Press, 2013:270. [12] PEIRAVIAN N, ZHU X Y. Machine learning for Android malware detection using permission and API calls[C]//Proceedings of the 25th International Conference on Tools with Artificial Intelligence. Washington, DC: IEEE Computer Society, 2013:300-305. [13] ZHANG R, YANG J. Android malware detection based on permission correlation[J]. Journal of Computer Applications, 2014,34(5):1322-1325. (张锐,杨吉云.基于权限相关性的Android恶意软件检测[J].计算机应用,2014,34(5):1322-1325.) [14] TANG W, JIN G, HE J M, et al. Extending Android security enforcement with a security distance model[C]//Proceedings of the 2011 International Conference on Internet Technology and Applications. Piscataway: IEEE Press, 2011:1-4. [15] WU D, ZHENG Z. Optimization scheme of access permission mechanism based on Android platform[J]. Computer Engineering, 2013,30(5):144-147.(吴大勇,郑紫徽.基于Android平台的访问权限机制优化方案[J].计算机工程,2013,30(5):144-147.) [16] BACKES M, GERLING S, HAMMER C, et al. AppGuard-enforcing user requirements on Android apps[M]//PITERMAN N, SMOLKA S A. Tools and algorithms for the construction and analysis of systems, LNCS 7795. Berlin: Springer, 2013:543-548. |