[1] Gartner. Gartner Says Worldwide Sales of Smartphones Grew 9 Percent in First Quarter of 2017[EB/OL]. https://www.gartner.com/newsroom/id/3725117, 2017-05-23.
[2] Gibler C, Crussell J, Erickson J, et al. AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale[C]// Proceedings of the 5th International Conference on Trust and Trustworthy Computing. 2012:291-307.
[3] Paye E, Spoto F. Static analysis of Android programs[J]. Information & Software Technology, 2012,54(11):1192-1201.
[4] Arzt S, Rasthofer S, Fritz C, et al. FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android APPs[J]. ACM SIGPLAN Notices, 2014,49(6):259-269.
[5] Huang Jianjun, Zhang Xiangyu, Tan Lin, et al. AsDroid: Detecting stealthy behaviors in Android applications by user interface and program behavior contradiction[C]// Proceedings of the 36th International Conference on Software Engineering. 2014:1036-1046.
[6] Pathak A, Jindal A, Hu Y C, et al. What is keeping my phone awake?Characterizing and detecting no-sleep energy bugs in smartphone APPs[C]// Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. 2012:267-280.
[7] Yu Le, Zhang Tao, Luo Xiapu, et al. Toward automatically generating privacy policy for Android APPs[J]. IEEE Transactions on Information Forensics & Security, 2017,12(4):865-880.
[8] Oglaza A, Laborde R, Benzekri A, et al. A recommender-based system for assisting non-technical users in managing Android permissions[C]// 2016 11th International Conference on Availability, Reliability and Security. 2016:1-9.
[9] Du Yao, Wang Junfeng, Li Qi. An Android malware detection approach using community structures of weighted function call graphs[J]. IEEE Access, 2017,5:17478-17486.
[10]Au K W Y, Zhou Yifan, Huang Zhen, et al. PScout: Analyzing the Android permission specification[C]// Proceedings of 2012 ACM Conference on Computer and Communications Security. 2012:217-228.
[11]Rasthofer S, Arzt S, Bodden E. A machine-learning approach for classifying and categorizing Android sources and sinks[C]// Proceedings of 2014 Network and Distributed System Security Symposium. 2014:1-15.
[12]Page L, Brin S, Motwani R, et al. The PageRank Citation Ranking: Bringing Order to the Web[R]. Technical Report, Stanford Digital Library Technologies Project, 1998.
[13]Inoue K, Yokomori R, Fujiwara H, et al. Component rank: Relative significance rank for software component search[C]// Proceedings of the 25th International Conference on Software Engineering. 2003:14-24.
[14]Luo H, Dong Y, Ng Y, et al. VertexRank: Importancerank for software network vertices[C]// 2014 IEEE 38th Annual Computer Software and Applications Conference (COMPSAC). 2014:251-260.
[15]Wu Tianyong, Liu Jierui, Xu Zhenbo, et al. Light-weight, inter-procedural and callback-aware resource leak detection for Android APPs[J]. IEEE Transactions on Software Engineering, 2016,42(11):1054-1076.
[16]Android. Runtime Permissions[EB/OL]. http://developer.Android.com/intl/zh-cn/about/versions/marshmallow/Android-6.0-changes.html, 2018-02-07.
[17]GitHub. NetworkX[EB/OL]. https://github.com/networkx/networkx, 2018-02-07.
[18]Scikit-learn. Machine Learning in Python[EB/OL]. http://scikit-learn.org/stable/, 2018-02-07. |