期刊文献+

基于应用层漏洞的安卓应用防护技术

下载PDF
导出
摘要 随着互联网技术的快速发展,移动应用逐渐融入人们生活的方方面面,在给人们生活带来便利的同时,其潜在的安全隐患也逐渐凸现出来,特别是对用户的个人隐私和财产安全。基于此,本文对安卓系统应用层漏洞防护技术展开研究,根据对应用层漏洞的深入研究,提出安卓系统的安全防护对策,以期有效解决应用层漏洞问题。
作者 王硕锋
出处 《电子技术与软件工程》 2019年第4期191-192,共2页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献5

二级参考文献51

  • 1李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 2Abdelrahman O H, Gelenbe E, G~rbil G, et al. Mobile network anomaly detection and mitigation: the NEMESYS approach[ M ]. Information Sciences and Systems 2013.Springer Information Publishing, 2013:429-439.
  • 3Arbor Networks: Worldwide Infrastructure Security Report (2012) [ EB/OL]. https: //www. arbornetworks, com/ news-and-events/press-releases/recent -press-releases/ 4737-the-arbor-networks-8 th-annual-worldwide-infrastrue- ture-security-report-finds-ddos-has-bccome-part-of-ad- vanced-threat-landscape.
  • 4Google Inc. Android Cloud to Device Messaging Frame- work [ EB/OL ]. http: Jj code. google, corn/android/ c2dm.
  • 5Apple Inc. Local and Push Notification Programming Guide[ EB/OL ]. http:// developer, apple, corn/library/ mac/doeumentation/Networkinglnternet/Conceptual/Re- moteNotificationsPG/RemoteNotificationsPG, pdf, 2011.
  • 6Microsoft Inc. Push Notifications Overview for Windows Phone [ EB/OL ] http : // msdn. microsoft, com/en-us/li- brary/ff402558 ( v = vs. 92 ). aspx.
  • 7Research In Motion Inc. Blackberry push service [ EB/ OL]. http: // us. blackberry, com/developers/platform/ pushapi, jsp.
  • 8Zhao S, Lee P P, Lui J, et al. Cloud-based push-styled mobile botnets : a case study of exploiting the cloud to de- vice messaging service[ C] //Proceedings of the 28th An- nual Computer Security Applications Conference, 2012: 119 - 128.
  • 9Lee H, Kang T, Lee S, et al. Punobot: Mobile Botnet Using Push Notification Service in Android[M]. Informa- tion Security Applications. Springer International Publish- ing, 2014:124 - 137.
  • 10Kartaltepe E J, Morales J A, Xu S, et al. Social net- work-based botnet command-and-control: emerging threats and countermeasures[M]. Applied Cryptography and Network Security. Springer International Publish- ing, 2010:511 -528.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部