1 |
Y. Zhou and X. Jiang, "Dissecting Android Malware: Characterization and Evolution," Proc 33rd IEEE Symp Security and Privacy, 2012.
|
2 |
L. K. Yan and H. Yin, "DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis," Proc 21st USENIX conf. Security Symp., Security, 2012.
|
3 |
R. Xu, H. Saidi, and R. Anderson, "Aurasium: Practical Policy Enforcement for Android Applications," 21st USENIX Security Symp. USENIX, 2012.
|
4 |
M. Chandramohan, and H. B. K. Tan, "Detection of Moblie Malware in the Wild," Comput., vol, 45 no. 9, Sept. 2012.
|
5 |
A. Moser, C. Kruegel, and E. Kirda, "Exploring Multiple Execution Paths for Malware Analysis," Proc. IEEE Symp. Security Privacy, SP, 2007, pp. 231-245.
|
6 |
W. Enck et al., "A Study of Android Application Security," Proc. 20th USENIX Conf. Security, Security, 2011.
|
7 |
Google. . Available: http://developer.android.com/guide/topics/manifest/permission-element.html.
|
8 |
Google. Android market developer program policies. Available: http://www.android.com/us/developer-content-policy.html.
|
9 |
F-Secure, "MOBILE THREAT REPORT, " 2014.
|
10 |
최희식, 조양현, "사물인넷 보안 문제제기와 대안," 디지털산업정보학회 논문지, 11권 1호, 2015, pp. 69-78.
|
11 |
신현조, 이경동, 박태형, "인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석," 디지털산업정보학회논문지, 10권 4호, 2015, pp. 97-107.
DOI
|