|
[1]Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis, “A secure smartphone applications roll-out scheme,” TrustBus'11: proceedings of the 8th international conference on trust, privacy and security in digital business, 2011. [2]William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri, “A Study of Android Application Security,” SEC'11: proceedings of the 20th USENIX conference on Security, pp. 21-21, 2011. [3]Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steven Hanna, and David Wagner, “A Survey of Mobile Malware in the Wild,” SPSM’11, October 17, 2011, Chicago, Illinois, USA. [4]Yacin Nadji, Jonathon Giffin, Patrick Trayno, “Automated remote repair for mobile malware,” ACSAC '11: proceedings of the 27th Annual Computer Security Applications Conference, 2011. [5]Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, “Crowdroid Behavior-Based Malware Detection System,” SPSM’11, October 17, 2011, Chicago, Illinois, USA. [6]Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, “,”Detecting repackaged smartphone applications in third-party android marketplaces, CODASPY '12: proceedings of the second ACM conference on Data and Application Security and Privacy, 2012. [7]Chen-Yuan Chuang, Yu-Chun Wang, Yi-Bing Lin, “Digital Right Management and Software Protection on Android Phones,” VTC 2010-Spring: 2010 IEEE 71th vehicular technology conference, pp.1-5, 16-19 May 2010. [8]Inkyung Jeun, Kwangwoo Lee, Dongho Won, “Enhanced code-signing scheme for smartphone applications,” FGIT'11: proceedings of the third international conference on future generation information technology, 2011. [9]Pern Hui Chia, Yusuke Yamamoto, N. Asokan, “Is this app safe?: a large scale study on application permissions and risk signals,” WWW '12: proceedings of the 21st international conference on World Wide Web, 2012. [10]Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, “Kernel-based Behavior Analysis for Android Malware Detection,” CIS '11: proceedings of the 2011 seventh international conference on computational intelligence and security, 2011. [11]Max Landman, “Managing Smart Phone Security Risks,” InfoSecCD '10: 2010 information security curriculum development conference, 2010. [12]Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger, “Measuring Integrity on Mobile Phone Systems,” SACMAT '08: proceedings of the 13th ACM symposium on access control models and technologies, 2008. [13]Charlie Miller, “Mobile Attacks and Defense,” IEEE Security and Privacy, Volume 9, Issue 4, 2011. [14]Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos, “Paranoid Android: versatile protection for smartphones,” ACSAC '10: proceedings of the 26th annual computer security applications conference, 2010. [15]Chaitrali Amrutkar, Patrick Traynor, “Short paper: rethinking permissions for mobile web apps: barriers and the road ahead,” SPSM '12: proceedings of the second ACM workshop on security and privacy in smartphones and mobile devices, 2012. [16]Cong Zheng, Shixiong Zhu, Shuaifu Dai, Guofei Gu, Xiaorui Gong, Xinhui Han, Wei Zou, “SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications,” SPSM '12: proceedings of the second ACM workshop on security and privacy in smartphones and mobile devices, 2012. [17]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth, “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” OSDI'10: proceedings of the 9th USENIX conference on operating systems design and implementation, 2010. [18]David Barrera, Jeremy Clark, Daniel McCarney, Paul C. van Oorschot, “Understanding and improving app installation security mechanisms through analysis of android,” SPSM '12: proceedings of the second ACM workshop on security and privacy in smartphones and mobile devices, 2012. [19]Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, Shihong Zou, “Fast, scalable detection of ‘piggybacked’ mobile applications,” CODASPY’13: proceedings of the third ACM conference on data and application security and privacy, 2013. [20]Spring Framework, http://spring.io/ (Accessed on 2015/3/15) [21]google-play-crawler, https://github.com/Akdeniz/google-play-crawler (Accessed on 2015/3/27) [22]apk-tool, http://ibotpeaches.github.io/Apktool/ (Accessed on 2015/4/5) [23]java.util.jar: https://docs.oracle.com/javase/8/docs/api/java/util/jar/package-summary.html (Accessed on 2015/4/5) [24]openssl, https://www.openssl.org/docs/apps/openssl.html (Accessed on 2015/4/21)
|