2Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
3Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
4Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
5Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
6Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
7Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
8Ligatti J,Bauer L,Walker D.Edit Automata:Enforcement Me-chanisms for Run-time Security Policies[J].International Journalof Information Security,2005,4(1-2):2-16.
9Wang Tielei,Wei Tao,Gu Guofei,et al.TaintScope:A Checksum-aware Directed Fuzzing Tool for Automatic Software VulnerabilityDetection[C]//Proc.of the 31st IEEE Symposium on Security&Privacy.Berkeley,USA:[s.n.],2010.
10Enck W.Defending Users Against Smartphone Apps:Techniquesand Future Directions[C]//Proc.of ICISS’11.Kolkata,India:[s.n.],2011.