[1] 肖卫, 张源, 杨珉. 安卓应用软件中Intent数据验证漏洞的检测方法[J]. 小型微型计算机系统, 2017, 38(4):813-819.(XIAO W, ZHANG Y, YANG M. Find Intent data validation vulnerability in Android application automatically and efficiently[J]. Journal of Chinese Computer Systems, 2017, 38(4):813-819.) [2] LU L, LI Z, WU Z, et al. CHEX:statically vetting Android apps for component hijacking vulnerabilities[C]//Proceedings of the 2012ACM Conference on Computer and Communications Security. New York:ACM, 2012:229-240. [3] GIBLER C, CRUSSELL J, ERICKSON J, et al. AndroidLeaks:automatically detecting potential privacy leaks in Android applications on a large scale[C]//Proceedings of the 5th International Conference on Trust and Trustworthy Computing. Berlin:Springer-Verlag, 2012:291-307. [4] VALL, E-RAI R, CO P, et al. Soot:a Java bytecode optimization framework[C]//Proceedings of CASCON 1st Decade High Impact Papers. Riverton, NJ:IBM, 2010:214-224. [5] ARZT S, RASTHOFER S, FRITZ C, et al. FlowDroid:precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps[J]. ACM SIGPLAN Notices, 2014, 49(6):259-269. [6] 王允超, 魏强, 武泽慧. 基于静态污点分析的Android应用Intent注入漏洞检测方法[J]. 计算机科学, 2016, 43(9):192-196.(WANG Y C, WEI Q, WU Z H. Approach of Android applications Intent injection vulnerability detection based on static taint analysis[J]. Computer Science, 2016, 43(9):192-196.) [7] 李红辉, 齐佳, 刘峰,等. 模糊测试技术研究[J]. 中国科学:信息科学, 2014, 44(10):1305-1322.(LI H H, QI J, LIU F, et al. The research progress of fuzz testing technology[J]. Science China:Information Sciences, 2014, 44(10):1305-1322.) [8] YANG K, ZHUGE J, WANG Y, et al. Intent Fuzzer:detecting capability leaks of Android applications[C]//Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2014:531-536. [9] MULLINER C, MILLER C. Fuzzing the phone in your phone[EB/OL].[2015-01-08].http://mulliner.org/security/sms/feed/smsfuzz_26c3.pdf. [10] The analysis report on generic denial of service vulnerability in Android APP[EB/OL].[2015-01-08].http://www.secpulse.com/archives/3859.html. [11] iSEC Partners. Intent Fuzzer[EB/OL].[2016-12-23].https://www.isecpartners.com/tools/mobile-security/intentfuzzer.aspx. [12] MAJI A K, ARSHAD F A, BAGCHI S, et al. An empirical study of the robustness of Inter-component communication in Android[C]//Proceedings of the 2012 IEEE/IFIP International Conference on Dependable Systems and Networks. Piscataway, NJ:IEEE, 2012:1-12. [13] 汤杨, 曾凡平, 王健康,等. 基于静态分析的Android GUI遍历方法[J]. 计算机应用, 2016, 36(10):2811-2815. (TANG Y, ZENG F P, WANG J K, et al. Android GUI traversal method based on static analysis[J]. Journal of Computer Applications, 2016, 36(10):2811-2815.) [14] 王敏, 陈少敏, 陈亚光. 基本路径测试用例设计算法[J]. 计算机应用, 2013, 33(11):3262-3266.(WANG M, CHEN S M, CHEN Y G. Test case design algorithm for basic path test[J]. Journal of Computer Applications, 2013, 33(11):3262-3266.) [15] 张密, 杨力, 张俊伟. FuzzerAPP:Android应用程序组件通信鲁棒性测试[J]. 计算机研究与发展, 2017, 54(2):338-347.(ZHANG M, YANG L, ZHANG J W. FuzzerAPP:the robustness test of application component communication in Android[J]. Journal of Computer Research and Development, 2017, 54(2):338-347.) [16] Intent class overview[EB/OL].[2016-11-09].https://developer.android.com/reference/android/content/Intent.html. [17] 李晓洲. Android应用程序组件漏洞测试方法研究[D]. 太原:太原理工大学, 2015:38-47. (LI X Z. Study of Android application component vulnerability testing method[D]. Taiyuan:Taiyuan University of Technology, 2015:38-47.) |