4Enck W, Ongtang M, McDaniel P. On lightweight mobile phone application certification [C] //Proceedings of the 16th ACM conference on Computer and Communications Security. USA: ACMPress, 2009: 235-245.
5Mohammad Nauman, Sohail Khan, Xinwen Zhang. Apex: Extending android permission model and enforcement with user- defined runtime constraints [C] //Proceedings of the 5th ACM Symposium on Information, Computer and Communications Se- curity. USA: ACM, 2010: 328-332.
6Francesco Di Cerbo, Andrea Girardello. Detection of malicious applications on android OS [C] //Computational Forensics, GRE: Springer, 2011: 138-149.
7Vidas T, Christin N, Cranor L. Curbing android permission creep [C] //Oakland, CA, USA: Proceedings of the Web 2.0 Security and Privacy Workshop, 2011.
8Asaf Shabtai, Yuval Elovici. Applying behavioral detection on android-based devices [J]. Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, 48 (5): 235-249.