[1] ACL. ACL(5)-Linux man page[EB/OL].[2019-03-23].http://linux.die.net/man/5/acl. [2] 尼见. 安卓平台下面向隐私保护的恶意程序分析与检测方法研究[D]. 北京:北京工业大学, 2017:25-27. (NI J. Privacy protection oriented malicious application analysis and detection method in Android platform[D]. Beijing:Beijing University of Technology, 2017:25-27.) [3] FELT A P, CHIN E, HANNA S, et al. Android permissions demystified[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security. New York:ACM, 2011:627-638. [4] FUCHS A P, CHAUDHURI A, FOSTER J S. SCanDroid:automated security certification of Android applications[EB/OL].[2019-04-04].https://www.cs.umd.edu/~avik/papers/scandroidascaa.pdf. [5] ENCK W, ONGTANG M, MCDANIEL P. On lightweight mobile phone application certification[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. New York:ACM, 2009:235-245. [6] NAUMAN M, KHAN S, ZHANG X. Apex:extending Android permission model and enforcement with user-defined runtime constraints[C]//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2010:328-332. [7] ZHOU Y, ZHANG X, JIANG, et al. Taming Information-stealing smartphone applications (on Android)[C]//Proceedings of the 2011 International Conference on Trust and Trustworthy Computing, LNCS 6740. Berlin:Springer, 2011:93-107. [8] ONGTANG M, MCLAUGHLIN S, ENCK W, et al. Semantically rich application-centric security in Android[C]//Proceedings of the 2009 Annual Computer Security Applications Conference. Piscataway:IEEE, 2009:340-349. [9] ENCK W, GILBERT P, CHUN B G, et al. TaintDroid:an information flow tracking system for real-time privacy monitoring on smartphones[J]. Communications of the ACM, 2014, 57(3):99-106. [10] HORNYACK P, HAN S, JUNG J, et al. These aren't the droids you're looking for:retrofitting Android to protect data from imperious applications[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security. New York:ACM, 2011:639-652. [11] ZHANG Y, YANG M, XU B, et al. Vetting undesirable behaviors in Android apps with permission use analysis[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer and communications security. New York:ACM, 2013:611-622. [12] BERESFORD A R, RICE A, SKEHIN N, et al. MockDroid:trading privacy for application functionality on smartphones[C]//Proceedings of the 12th Workshop on Mobile Computing Systems and Applications. New York:ACM, 2011:49-54. [13] ALLEN G. Android Security and Permissions[M]//Beginning Android. Berkeley, CA:Apress, 2015:343-354. [14] SHABTAI A, FLEDEL Y, ELOVICI Y. Securing Android-powered mobile devices using SELinux[J]. IEEE Security and Privacy, 2010, 8(3):36-44. [15] BUGIEL S, DAVI L, DMITRIENKO A, et al. Practical and lightweight domain isolation on Android[C]//Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices. New York:ACM, 2011:51-62. [16] ZHAO Z, OSONO F C C. "TrustDroidTM":preventing the use of smart phones for information leaking in corporate networks through the used of static analysis taint tracking[C]//Proceedings of the 7th International Conference on Malicious and Unwanted Software. Piscataway:IEEE, 2012:135-143. [17] SMALLEY S, CRAIG R. Security Enhanced (SE) Android:bringing flexible MAC to Android[EB/OL].[2019-02-26]. http://www.cs.columbia.edu/~lierranli/coms6998-7Spring2014/papers/SEAndroid-NDSS2013.pdf. [18] 孙亚楠,石文昌,梁洪亮,等. 安全操作系统基于ACL的自主访问控制机制的设计与实现[J]. 计算机科学, 2004, 31(7):153-155. (SUN Y N, SHI W C, LIANG H L, et al. Design and implementation of ACL based discretionary access control mechanism in secure operation system[J]. Computer Science, 2004, 31(7):153-155.) [19] 罗琰,张涛,张毓森. Linux环境下访问控制列表机制的设计与实现[J]. 解放军理工大学学报(自然科学版), 2004, 5(3):24-27. (LUO Y, ZHANG T,ZHANG Y S. Design and implementation of access control list mechanism under Linux environment[J]. Journal of PLA University of Science and Technology (Natural Science Edition), 2004, 5(3):24-27.) [20] AHMED M, AHAMAD M. Protecting health information on mobile devices[C]//Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. New York:ACM, 2012:229-240. |