[1]Fritz C. FlowDroid: A precise and scalable data flow analysis for Android[D]. Technische Universitt Darmstadt, 2013.
[2]Reps T, Horwitz S, Sagiv M. Precise interprocedural data flow analysis via graph reachability[J]. Lecture Notes in Computer Science, 1995,167(96):49-61.
[3]Soot. A Framework for Analyzing and Transforming Java and Android Applications[EB/OL]. https://sable.github.io/soot/, 2016-09-01.
[4]Einarsson A, Nielsen J D. A Survivor’s Guide to Java Program Analysis with Soot[EB/OL]. http://www.brics.dk/SootGuide/sootsurvivorsguide.pdf, 2008-07-17.
[5]Google Inc. Android API Guides: App Components[EB/OL]. https://developer.android.com/guide/components/index.html, 2016-09-01.
[6]Yang Zhemin, Yang Min. LeakMiner: Detect information leakage on Android with static taint analysis[C]// Proceedings of the 3rd World Congress on Software Engineering. 2012:101-104.
[7]Gibler C, Crussell J, Erickson J, et al. Androidleaks: Automatically detecting potential privacy leaks in Android applications on a large scale[C]// Proceedings of the 5th International Conference on Trust and Trustworthy Computing. 2012:291-307.
[8]Fuchs A P, Chaudhuri A, Foster J S. ScanDroid: Automated Security Certification of Android Applications, Technical Report CS-TR-4991[R]. Department of Computer Science, University of Maryland, College Park, 2009.
[9]Lu Long, Li Zhichun, Wu Zhenyu, et al. CHEX: Statically vetting Android Apps for component hijacking vulnerabilities[C]// Proceedings of the 19th ACM Conference on Computer and Communications Security. 2012:229-240.
[10] Zhao Zhibo, Osono F C C. TrustDroid: Preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking[C]// Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012:135-143.
[11]Arzt S, Rasthofer S, Fritz C, et al. FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android Apps[C]// Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2014:259-269.
[12]WikiPedia. APK[EB/OL]. http://zh.wikipedia.org/wiki/APK, 2016-09-01.
[13]DroidBench. A micro-benchmark suite to assess the stability of taint-analysis tools for Android[DB/OL]. https://github.com/secure-software-engineering/DroidBench, 2016-09-01.
[14]King D, Hicks B, Hicks M, et al. Implicit flows: Can’t live with ‘em, can’t live without ‘em[C]// Proceedings of the 4th International Conference on Information Systems Security. 2008:56-70.
|