1 |
Google Android Developers Official Site: Dev Gude, "", [Online]: http://developer.android.com/guide/to pics/security/permissions.html
|
2 |
National Institute of Standards and Technology, "National Vulnerability Database, CVE-2011-4872", Feb. 2012. [Online]: http://web.nvd.nist.gov/view/vuln/det ail?vulnId=CVE-2011-4872
|
3 |
IDC, "Worldwide Quarterly Mobile Phone Tracker." Aug. 8. 2012.
|
4 |
Juniper Networks, "2011 Mobile Threats Report," Feb. 2012.
|
5 |
AhnLab, "ASEC 2011년 12월 Report," 2011 년 12월.
|
6 |
한국인터넷진흥원, 안드로이드 기반 모바일 운영 체제 보안기능 분석, KISA-WP-2010-0011, 2010년 8월.
|
7 |
김익환, 김태현, "안드로이드 플랫폼에서 유연한 응용프로그램 권한관리 기법 설계 및 구현," 정보처리학회 논문지C, 18-C(3), pp. 151-156, 2011 년 6월.
|
8 |
Y. Zhou and X. Jiang, "Dissecting Android Malware: Characterization and Evolution," Proceeding of the 2012 IEEE Symposium on Security and Privacy, pp. 95-109, May. 2012.
|
9 |
B. Sarma, N. Li, C. Gates, R. Potharaju, and C. Nita-Rotaru, "Android permissions: a perspective combining risks and benefits," Proceeding of the 17th ACM symposium on Access Control Models and Technologies, pp. 13-22, Jun. 2012.
|
10 |
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets," Proceedings of the 19th Annual Symposium on Network and Distributed System Security, Feb. 2012.
|
11 |
E. Chin, A. Felt, K. Greenwood, and D. Wagner, "Analyzing Inter-Application Communication in Android," Proceedings of the 9th international conference on Mobile systems, applications, and services, pp.239-252, Jun. 2011.
|
12 |
Contagio Malware Dump, "Take a sample, leave a sample. Mobile malware mini-dump - July 8 Update", Jul. 2011. [Online]: http://contagiodump.blogspot.kr/2011/ 03/take-sample-leave-sample-mobilemalware. html
|
13 |
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, "Android Permissions: User Attention, Comprehension and Behavior," UCB/EECS- 2012-26, University of California at Berkeley. 2012.
|