期刊文献+

Android安全技术分析 被引量:1

下载PDF
导出
摘要 Android是一种深受人们的厚爱的开放源代码的操作系统,它基于Linux,以其强大的功能,廉价和开源的特征,在带来便利实用等的同时,也带来了安全隐患。本文将结合源码分析Android的安全技术,希望能够对Android操作系统研究有所帮助。
作者 张琳
机构地区 北京大学
出处 《电子技术与软件工程》 2016年第18期211-211,共1页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献2

二级参考文献25

  • 1Davi, L., Dmitrienko, A., Sadeghi, A.R. and Winandy, M.Privilege escalation attacks on android[J]. Information Security. 346-360.
  • 2Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y. and Dolev, S. Google Android: A state-of-the-art review of security mechanisms[J]. Arxiv preprmt arXiv:0912.5101.
  • 3ENCK, W., ONGTANG, M., AND MCDANIEL, P. 2009b. Understanding Android Security[J]. IEEE Security and Privacy, 7(01):50-57.
  • 4Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S. and Glezer, C.Google Android: A comprehensive security assessment[J]. Security & Privacy, IEEE, 8 (02). 35-44.
  • 5Chandhuri, A. Language-based security on Android[C]. Proceedings of the ACM SIGPLAN Fourth Workshop on Progrmnming Languages and Analysis for Security, 2009, 1-7.
  • 6C .Enrique Ortiz.理解Android上的安全性:利用沙箱、应用程序签名和权限增强应用程序安全性[EB/OL]. http://www.ibm.com/developerworks/cn/xml/x-androidsecurity/index.html, 2010 -12 -13.
  • 7Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving Performance of Network Covert Timing Channel through Huffman Coding[C]. The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applicafom for Future Computing (ACSA 2010). Gwangju, Korea. Dec 9-11, 2010.
  • 8Jingzheng Wu, Yongji Wang, Liping Ding, Yanping Zhang. Constructing Scenario of Event-Flag Covert Channel in Secure Operating System[C]. 2rid International Conference on Information and Multimedia Technology (ICIMT 2010). Hongkong. Dec 28-30, 2010.
  • 9Tian Shuo, He Yeping, Ding Liping. A Countermeasure against Stack-smashing Attack Based on Canary Obtained through Nonlinear Transformation[C]. Proceedings of 2010 2rid International Conference on Information and Multimedia Technology (ICIMT 2010), Hong Kong 12.28-12.30.2010.
  • 10Jianchun Jiang, Weifeng Chen, Liping Ding. On Estimating Cyber Adversaries' Capabilities - A Bayesian Model Approach[C]. (Poster) Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada, September 15-17, 2010.

共引文献50

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部