4ISOHARA T, TAKEMORI K, KUBOTA A. Kernel-based behavior analysis for Android malware detection [ C ]///Proc of 7th International Conference on Computational Intelli- gence and Security. 2011.
5ZHOU Yajin, JIANG Xuxian. Dissecting Android malware: Characterization and evolution [ C ]//Proc of IEEE Sympo- sium on Security and Privacy. 2012:95 - 109.
6FELT A P, GREENWOOD K, WAGNER D. The effective- ness of application permissions[ C]//Proc of USENIX We- bApps. 2011.
7BORJA S, IGOR S, CARLOS L, et al. PUMA : Permission usage to detect malware in Android [ C ]//International Joint Conference. Berlin, Germany: Springer, 2012: 289 - 298.