共 9 条
- [1] Common vulnerabilities and exposures
- [2] Lu L., Li Z., Wu Z., Et al., CHEX: statically vetting android apps for component hijacking vulnerabilities, Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 229-240, (2012)
- [3] Fu J., Li P., Yi Q., Et al., A static detection of security defects between inter-components' communication, Journal of Huangzhong University of Science and Technology: Nature, 41, pp. 259-264, (2013)
- [4] Chin E., Felt A.P., Greenwood K., Et al., Analyzing inter-application communication in android, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services and Co-located Workshops, pp. 239-252, (2011)
- [5] Octeau D., McDaniel P., Jha S., Et al., Effective inter-component communication mapping in android with epicc: an essential step towards holistic security analysis, Proceedings of the 22nd Usenix Conference on Security, pp. 543-558, (2013)
- [6] Wang K., Liu Q., Zhang Y., Android inter-application communication vulnerability mining technique based on fuzzing, Journal of University of Chinese Academy of Sciences, 31, 6, pp. 827-835, (2014)
- [7] Haldar V., Chandra D., Franz M., Dynamic taint propagation for java, Proceedings of the 21st Annual Computer Security Applications Conference, pp. 303-311, (2005)
- [8] Androguard project
- [9] App store