移动终端安全文献

更新时间:2023-07-27 23:40:15 阅读: 评论:0

参考文献:
[1] Android. /.
[2] iOS. /iphone/ios/.
[3] Spy.Flexispy变种. www.antivirus-china/. 2011.
[4] Gartner. /technology/home.jsp. 2011.洛克王国毛毛
[5]人民网. /GB/13962335.html. 2011.
[6] 第28次中国互联网发展状况统计报告. /special/cnnic28/. 2011.
[7] 王慧强, 赖积保, 朱亮, 等. 网络态势感知系统研究综述. 计算机科学, 2006, 33(10): 5-10.
[8] 吴振强, 周彦伟, 乔子芮. 移动互联网下可信移动平台接入机制. 通信学报, 2010, 31(10):158-169.
[9] 见晓春, 吴振强, 王小明, 等. 移动互联网络动态匿名算法设计与分析. 计算机工程与应用, 2009, 45(18): 115-119.
[10] 周彦伟, 吴振强,乔子芮. 移动互联网可信匿名通信模型. 计算机应用, 2010, 30(10): 2669-2676.
[11] Matthias Lange, Steffen Liebergeld. L4Android: A Generic Operating System Framework for Secure Smartphones. ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Oct. 2011.
[12] Andrea Lanzi, Monirul Sharif, Wenke Lee. K-Tracer: A System for Extracting Kernel Malware Behavior. In Proceedings of Network & Distributed System Security Symposium, Oct. 2009.
[13] Manuel Egele, Christopher Kruegely, Engin Kirdaz, et al. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of Network & Distributed System Security Symposium, Feb. 2011.复工条件验收报告
[14] Abhinav Srivastava, Jonathon Giffin. Efficient Monitoring of Untrusted Kernel-Mode Execution. In Proceedings of Network & Distributed System Security Symposium, Feb. 2011.
[15] Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, et al. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-bad Signatures. In Proceedings of Network & Distributed System Security Symposium, Feb. 2011.
小龙虾家常做法[16] Asaf Shabtai, Yuval Fledel, Y uval Elovici. Securing Android-Powered Mobile Devices Using SELinux. IEEE Security and Privacy, 2010, 8(3): 36-44.
[17] Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk. Permission Re-Delegation: Attacks and Defens. In Proceedings of USENIX Security Conference, Aug. 2011.
[18] Adrienne Porter Felt, Kate Greenwood, David Wagner. The Effectiveness of Application Permissions. In Proceedings of the 2nd USENIX Conference on Web Application Development, Aug. 2011.
[19] David Barrera, H. Güne¸s Kayacık. A Methodology for Empirical Analysis of Permission-Bad Security Models and its Application to Android. In Proceedings of 17th ACM Conference on Computer and Communications Security, Oct. 2010.
[20] Kathy Au, Billy Zhou, Zhen Huang, et al. A Look at SmartPhone Permission Models. ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Oct. 2011.每日一读
十全十美近义词[21] Adrienne Porter Felt, Erika Chin, Steve Hanna, et al. Android Permissions Demystified. In Proceedings of 18th ACM Conference on Computer and Communications Security, Oct. 2011.
[22] Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani. Crowdroid: Behavior-Bad Malware Detection System for Android. ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Oct. 2011.
[23] Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek Scalable. Behavior-Bad Malware Clustering. In Proceedings of Network & Distributed System Security Symposium, Feb. 2011.
[24] William Enck, Machigar Ongtang, Patrick McDaniel. Understanding Android Security. IEEE Security and Privacy, 2009, 7(1): 50-57.
[25] William Enck, Damien Octeau, Patrick McDaniel, et al. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium, Aug. 2011.
[26] William Enck, Peter Gilbert, Byung-Gon Chun, et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, Oct. 2010.
[27] William Enck, Machigar Ongtang, Patrick McDaniel. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Nov. 2009.
[28] Machigar Ongtang, Stephen McLaughlin, William Enck, et al. Semantically Rich Application-Centric Security in Android. In Proceedings of the 25th Annual Computer Security Applications Conference, Dec. 2009.
马上英语
[29] William Enck, Patrick McDaniel, Trent Jaeger. PinUP: Pinning Ur Files to Known Applications. In Proceedings of the 24th Annual Computer Security Applications Conference, Dec. 2008.
晨会开场白[30] Juan Caballero, Noah M. Johnson, Stephen McCamant, et al. Binary Code Extraction and Interface Identification for Security Applications. In Proceedings of Network & Distributed System Security Symposium, Oct. 2009.
[31] David Barrera, Paul van Oorschot. Secure Software Installation on Smartphones. IEEE Security and Privacy, 2011, 9(3):42-48.
[32] Steven Swanson, Michael Bedford Taylor. GreenDroid: Exploring the Next Evolution in Smartphone Application Processors. IEEE Communications Magazine, 2011, 49(4): 112-119.
[33] Peter Hornyack, Seungyeop Han, Jaeyeon Jung. “The Aren’t the Droids You’re Looking For”: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of 18th ACM Conference on Computer and Communications Security, Oct. 2011.
[34] Timothy Vidas, Daniel V otipka, Nicolas Christin. All Your Droid Are Belong To Us: A Survey of Current Android Attacks. In Proceedings of the 5th USENIX Conference on Offensive Technologies,
Aug. 2011. [35] Adrienne Porter Felt, Matthew Finifter, Erika Chin, et al.    A Survey of Mobile Malware in the Wild. ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Oct. 2011.
[36] Charlie Miller. Mobile Attacks and Defen. IEEE Security and Privacy, 2011, 9(4): 68-70.
[37] Asaf Shabtai, Yuval Fledel, Uri Kanonov, et al. Google Android: A Comprehensive Security Asssment. IEEE Security and Privacy, 2010, 8(2): 35-44.
[38] Domenico Ficara, Andrea Di Pietro, Stefano Giordano, et al. Enhancing Counting Bloom Filters Through Huffman-Coded Multilayer Structures. IEEE/ACM Transactions on Networking, 2010, 18(6): 1977-1987. [39] Jehoshua Bruck, Jie Gao, Anxiao (Andrew) Jiang. Weighted Bloom Filter. In Proceedings of 2006 IEEE International Symposium on Information Theory, Jul. 2006.
[40] Michael Mitzenmacher. Compresd Bloom Filters. IEEE/ACM Transactions on Networking, 2002, 10(5): 604-612.
[41] Christian Esteve Rothenberg, Carlos A. B. Macapuna, F´abio L. Verdi, et al. The Deletable Bloom Filter:
a New Member of the Bloom Family. IEEE Communications Letters, 2010, 14(6): 557-559.
[42] Brent Waters, Ari Juels, J. Alex Halderman, et al. New Client Puzzle Outsourcing Techniques for DoS Resistance. In Proceedings of 11th ACM Conference on Computer and Communications Security, Oct. 2004.
[43] Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, et al. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proceedings of ACM Conference on Wireless Network Security, Mar. 2008.描写竹子的古诗

本文发布于:2023-07-27 23:40:15,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/89/1099289.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:移动   互联网   匿名   可信   研究
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图