A collaborative policy-based security scheme to enforce resource access controlling mechanism
Tóm tắt
Tài liệu tham khảo
Zhang, Y., Wei, T., Song, D., Xue, H. (2013) Ad vulna: a vulnaggressive (vulnerable & aggressive) adware threatening millions. Threat Res.
Enck, W., Ongtang, M., & McDaniel, P. Mitigating android software misuse before it happens, Technical Report (NAS-TR-0094-2008), Network and Security Research center.
Crussell, J., Stevens, R., & Chen, H. (2014) MadFraud: investigating Ad Fraud in android applications. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services (pp. 123–134).
Zhang, Y., Yang, M., Yang, Z., Gu, G., Niry, P., & Zang, B. (2013) Permission use analysis to vetting undesirable behaviors in android applications. In Proceedings of the ACM SIGSAC conference on Computer & communications security (pp. 611–622).
Zou, S., Zhang, J., & Lin, X. (2015). An effective behavior-based Android malware detection system. Security and Communication Networks,8(12), 2079–2089.
Russello, G., Jimenez, A. B., Naderi, H., & Vander Mark, W. (2013) FireDroid: Hardening security in almost stock android. In Proceedings of the 29th annual computer security applications conference (ACSAC’13) (pp. 319–328).
Liu, B., Nath, S., Govinder, R., & Liu,J. (2014) DECAF: Detecting and characterizing adfraud in mobile application. In Proceedings of the 11th USENIX conference on networked systems design and implementation (NSDI’14) (pp. 57–70).
Barr, K., Bungale, P., Deasy, S., Gyuris, V., Hung, P., Newell, C., et al. (2010). The VMware mobile virtualization platform: is that a hypervisor in your pocket. ACM SIGOPS Operating Systems Review,44(4), 124–135.