|
[1] A. Porter Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A Survey of Mobile Malware in the Wild”, In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphone and Mobile Device, CSS-SPSM’11, 2011.
[2] Dalvik Virtual Machine, https://source.android.com/devices/tech/dalvik/index.html
[3] M. Nauman, S. Khan, X. Zhang, “Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints”, In Proceedings of the ACM Symposium on Information, Computer, and Communications Security, ASIACCS’10, 2010.
[4] L. Yang, N. Boushehrinejadmoradi, P. Roy, V. Ganapathy, L. Iftode, “Short Paper: Enhancing Users’ Comprehension of Android Permissions”, In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphone and Mobile Device, CSS-SPSM’12, 2012.
[5] P. Pearce, A.Porter Felt, G. Nunez, D. Wagner, “AdDroid: Privilege Separation for Applications and Advertisers in Android”, In Proceedings of the ACM Symposium on Information, Computer, and Communications Security, ASIACCS’12, 2012.
[6] J. Jeon, K. K. Micinski, J. A. Vaughan, N. Reddy, Y. Zhu, J. S. Foster, T. Millstein, “Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android”, In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphone and Mobile Device, CSS-SPSM’12, 2012.
[7] W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, A. N. Sheth, “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones”, In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI’10, 2010.
[8]AdMob , http://www.google.com.tw/ads/admob/
[9]Android Content Provider , http://developer.android.com/guide/topics/providers/content-providers.html
[10] Ubuntu, http://www.ubuntu.com/ [11] Mitmproxy, http://mitmproxy.org/
[12] Eclipse ADT bundle , http://developer.android.com/tools/sdk/eclipse-adt.html
[13]Genymotion , http://www.genymotion.com/
|