[1]GU X. Android occupy 81% maket share in the global smart phone market, Apple's share fell [EB/OL]. [2013-11-14]. http://news.xinhuanet.com/tech/2013-11/14/c_125699425.htm.(古晓宇.全球智能手机市场安卓独占81% 苹果份额下滑[EB/OL].[2013-11-14].http://news.xinhuanet.com/tech/2013-11/14/c_125699425.htm.)
[2]Kaspersky. Unveiling "Careto" : The masked APT[EB/OL].[2014-02-18].http://kasperskycontenthub.com/wp-content/uploads/sites/43/vlpdfs/unveilingthemask_v1.0.pdf.
[3]LI B, WO T, HU C, et al. VMM-based operating system hidden objects off joint detection technology [J]. Journal of Software, 2013,24(2):405-420.(李博,沃天宇,胡春明,等.基于VMM的操作系统隐藏对象关联检测技术[J].Journal of Software,2013,24(2):405-420.)
[4]WANG B. Design and implementation of the Linux server's virus protection system API Layer [D]. Nanjing: Nanjing University, 2012.(王博.Linux服务器病毒防护系统API Layer的设计与实现[D].南京:南京大学,2012.)
[5]WANG Q, HU D, XU S, et al. Research and implementation of the 2.6 Linux kernel process based interception mechanism [J]. Microcomputer Information, 2012,28(9):13-15.(王全民,胡大海,许殊玮,等.基于Linux内核2.6的进程拦截机制的研究和实现[J].微计算机信息,2012,28(9):13-15.)
[6]JINAG H, YANG F, DUAN H, et al. Rootkit detection methods and research techniques to hide [J]. Journal of Chinese Computer Systems, 2012,33(5):1006-1011.(姜辉,杨峰,段海新.Rootkit隐藏技术与检测方法研究[J].小型微型计算机系统,2012,33(5):1006-1011.)
[7]LI X, HUANG H. Kernel integrity monitoring approach a hardware-based virtualization [J]. Computer Science, 2011,38(12):68-72.(李珣,黄皓.一个基于硬件虚拟化的内核完整性监控方法[J].计算机科学,2011,38(12):68-72.)
[8]JIANG S, WANG J, ZHANG T, et al. Summary of safety research Android [J]. Computer Applications and Software, 2012,29(10):205-210.(蒋绍林,王金双,张涛,等.Android安全研究综述[J].计算机应用与软件,2012,29(10):205-210.)
[9]CHEN W. Android kernel-level research Rootkit detection module based signature [D]. Nanjing: Nanjing University, 2012.(陈文.基于模块签名的Android内核级Rootkit检测方法研究[D].南京:南京大学,2012.)
[10]ZHU W. Kernel-level attacks and Rootkit detection technology Android platform [D]. Shanghai: Shanghai Jiao Tong University, 2013.(祝为.Android平台的内核级Rootkit攻击与检测技术[D].上海:上海交通大学,2013.)
[11]LIU Z. Kernel mode Rootkit research system based on Android [D]. Chengdu: University of Electronic Science and Technology of China, 2012.(刘自龙.基于Android系统的内核态Rootkit研究[D].成都:电子科技大学,2012.)
[12]LI S, YAN H. Linux user space encryption/decryption API design and implementation [J]. Computer Applications and Software, 2013,30(2):184-188.(李石磊,闫宏印.Linux用户空间加/解密API的设计与实现[J].计算机应用与软件,2013,30(2):184-188.) |