참고문헌
- IDC, "Smartphone OS Market Share, 2015 Q2", "http://www.idc.com/prodserv/smartphone-os-market-share.jsp," 2015.
- Q1 2014 MobileThreatReport, "http://www.f-secure.com/weblog/archives/00002699.html," 2014
- KISA, "Analysis of Android Mobile Platform Security Model", Aug. 2010.
- Adrienne Porter Felt, Elizabeth Hay, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. "Android permissions: User attention, comprehension, and behavior," In Proceedings of Symposium on Usable Privacy and Security, 2012.
- Korea Communication Commission, "Guidelines for privacy protection on smart phone application," Aug. 2015.
- Financial Supervisory Service, "Required implementation of privacy information leak prevention for smartphone app," Aug. 2015.
- Google Android Developers Official Site, "http://developer.android.com/reference/android/Manifest.permission.html," 2015.
- Android Full Source Android Manifest File, "https://android.googlesource.com/platform/frameworks/base/+/.../core/res/AndroidManifest.xml," 2015.
- Android-defined Permission Category, "http://developer.android.com/reference/android/Manifest.permission_group.html," 2015
- A tool for reverse engineering Android apk files, "http://ibotpeaches.github.io/Apktool"
- Reverse engineering, Malware and goodware analysis of Android applications, "https://code.google.com/p/androguard/wiki/RE#Permissions"
- Android Asset Packaging Tool, "http://elinux.org/Android_aapt"
- Tools to work with android .dex and java .class files, "http://sourceforge.net/projects/dex2jar"
- Jad Decompiler, "http://www.javadecompilers.com/jad"
- K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, "Pscout: analyzing the android permission specification," In Proceedings of the 2012 ACM conference on Computer and communications security, pp 217-228. Oct. 2012.
- A. P. Felt, K. Greenwood, and D. Wagner. "The effectiveness of application permissions," in Proceedings ofthe USENIX Conference on Web Application Development, 2011.
- A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. "Android permissions demystified," In Proceedings of the18th ACM conference on Computer andcommunications security, pages 627-638. ACM, 2011.
- W. Enck, M. Ongtang, and P. McDaniel. "On lightweight mobile phone application certification," in Proceedings of the 16th ACM conference on Computer and communications security, 2009.
- T. Vidas, N. Christin, and L. Cranor. "Curbing androidpermission creep," In Proceedings of the Web, volume 2, 2011.
- Xuetao Wei, Lorenzo Gomez, Lulian Neamtiu, Michalis Faloutsos, "Permission Evolution in the Android Ecosystem," Dec, 2012.