[1] IDC. Smartphone market share[EB/OL]. (2018-02-20)[2018-03-29]. https://www.idc.com/promo/smartphone-market-share/os. [2] BAGHERI H, KANG E, MALEK S, et al. A formal approach for detection of security flaws in the Android permission system[J]. Formal Aspects of Computing, 2017, 9:1-20. [3] Google. Permissions best practices[EB/OL]. (2018-01-20)[2018-03-26]. https://developer.android.google.cn/training/permissions/best-practice. [4] FELT A P, CHLN E, HANNA S, et al. Android permissions demystified[C]//CCA2011:Proceedings of the 18th ACM Conference on Computer and Communications Security. New York:ACM, 2011:627-638. [5] 张锐,杨吉云.基于权限相关性的Android恶意软件检测[J].计算机应用,2014,34(5):1322-1325.(ZHANG R, YANG J Y. Android malware detection based on permission correlation[J]. Journal of Computer Applications,2014, 34(5):1322-1325.) [6] TUNCAY G S, DEMETRIOU S, GANJU K, et al. Resolving the predicament of Android custom permissions[C]//NDSS 2018:Proceedings of the 2018 Network and Distributed System Security Symposium. Piscataway, NJ:IEEE, 2018:1-16. [7] HAMED A, AYED H K B. Privacy risk assessment and users' awareness for mobile APPs permissions[C]//Proceedings of the 2017 International Symposium on Computer Systems and Applications. Piscataway, NJ:IEEE, 2017:1-8. [8] 徐君锋,王嘉捷,朱克雷,等.基于AHP的安卓应用安全信用指数度量方法[J].清华大学学报(自然科学版),2018,58(2):131-136.(XU J F, WANG J J, ZHU K L, et al. Credit index measurement method for Android application security based on AHP[J]. Journal of Tsinghua University (Science and Technology), 2018,58(2):131-136.) [9] RAHMAN A, PRADHAN P, PARTHO A, et al. Predicting Android application security and privacy risk with static code metrics[C]//Proceedings of the 2017 IEEE/ACM International Conference on Mobile Software Engineering and Systems. Piscataway, NJ:IEEE, 2017:149-153. [10] DINI G, MARTINELLI F, MATTEUCCI I, et al. Risk analysis of Android applications:a user-centric solution[J]. Future Generation Computer Systems, 2018, 80:505-518. [11] TANG W, JIN G, HE J, et al. Extending Android security enforcement with a security distance model[C]//Proceedings of the 2011 International Conference on Internet Technology and Applications. Piscataway, NJ:IEEE, 2011:1-4. [12] VXShare. VirusShare[EB/OL].[2017-10-09]. https://vir-usshare.com. [13] DESNOS A, GUEGUEN G, BACHMANN S. Androguard package[EB/OL].[2017-12-29]. http://androguard.readthedocs.io/en/latest/api/androguard.html. |