|
[1] Gartnerreportofsmartphonesales. http://www.gartner.com/newsroom/id/ 3215217. [2] Number of apps on google play in march 21, 2016. http://www.appbrain. com/stats/number-of-android-apps. [3] Yours apps are watching you. http://www.wsj.com/articles/ SB10001424052748704368004576027751867039730. [4] Xposed. http://repo.xposed.info/. [5] Cydia substrate. http://www.cydiasubstrate.com/. [6] Android malware analysis. http://resources.infosecinstitute.com/ android-malware-analysis/. [7] Min Zheng, Mingshen Sun, and John C.S. Lui. Droidanalytics: A signature based analytic system to collect, extract, analyze and associate android malware. In The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pages 163–171, 2013. [8] Sandbox. https://en.wikipedia.org/wiki/Sandbox_(computer_ security). [9] Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. Crowdroid: Behavior-based malware detection system for android. In SPSM ’11 Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 15–26, 2011. 39 [10] Droidbox. https://code.google.com/archive/p/droidbox/. [11] Yajin Zhou and Xuxian Jiang. Dissecting android malware: Characterization and evolution. In IEEE Symposium on Security and Privacy, pages 95–109, 2012. [12] ZheMin Yang and Min Yang. Leakminer: Detect information leakage on android with static taint analysis. In Third World Congress on Software Engineering, pages 101–104, 2012. [13] Alastair R. Beresford, Andrew Rice, Nicholas Skehin, and Ripduman Sohan. Mockdroid: trading privacy for application functionality on smartphones. In HotMobile ’11 Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, pages 49–54, 2011. [14] Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, and Toshihiro Yamauchi. Droidtrack: Tracking and visualizing information diffusion for preventing informationleakageonandroid. InMultimediaandUbiquitousEngineering,pages 243–251, 2013. [15] William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In ACM Transactions on Computer Systems (TOCS), pages Vol. 32, No. 2, Article 5, 2014. [16] Naser Peiravian and Xingquan Zhu. Machine learning for android malware detectionusingpermissionandapicalls. InIEEE25thInternationalConference on Tools with Artificial Intelligence, pages 300–305, 2013. [17] Dong-JieWu,Ching-HaoMao, Te-EnWei,Hahn-MingLee, andKuo-PingWu. Droidmat: Android malware detection through manifest and api calls tracing. In Seventh Asia Joint Conference on Information Security, pages 62–69, 2012. [18] Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, and Ting Han. Migdroid: Detecting app-repackaging android malware via method invocation 40 graph. In 23rd International Conference on Computer Communication and Networks (ICCCN), pages 1–7, 2014. [19] Hypertext transfer protocol. https://en.wikipedia.org/wiki/Hypertext_ Transfer_Protocol. [20] Apimonitor. https://code.google.com/archive/p/droidbox/wikis/ APIMonitor.wiki. [21] Androiddebugbridge. http://developer.android.com/intl/zh-tw/tools/ help/adb.html. [22] Kingroot-theone-clickroottoolforalmostalldevices.http://www.kingroot. net/.
|