期刊文献+
共找到152篇文章
< 1 2 8 >
每页显示 20 50 100
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
1
作者 Rahul Gupta Kapil Sharma R.K.Garg 《Computers, Materials & Continua》 SCIE EI 2024年第3期4283-4301,共19页
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and... The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature. 展开更多
关键词 ANDROID MALWARE android security hybrid analysis permission and system call pairs
下载PDF
Android Permission机制的实现与安全分析 被引量:6
2
作者 张中文 雷灵光 王跃武 《信息网络安全》 2012年第8期3-6,共4页
Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permis... Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permission机制漏洞。应用程序利用该漏洞可以绕过权限管理,主动提升应用程序的访问权限,为后续攻击提供支持。同时文章也对Permission机制其它方面的安全特性进行了分析。 展开更多
关键词 ANDROID系统 PERMISSION 安全 漏洞
下载PDF
一种增强的Android安全机制模型 被引量:9
3
作者 陈伟鹤 邱道龙 《无线通信技术》 2014年第1期37-41,共5页
随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Plo... 随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Ploy安装程序之前先对应用程序和权限进行分析检测,然后将检测分析后的权限呈现给用户。实验结果表明在造成一定性能损失的情况下,新的框架可以有效减少用户所需设置的权限。 展开更多
关键词 ANDROID ANDROID PERMISSION 安全 策略模型
下载PDF
Android操作系统的安全机制研究 被引量:2
4
作者 朱长江 杨一平 《电脑知识与技术》 2013年第9期5628-5629,共2页
Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Li... Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Linux内核方面及Android自身权限机制方面存在的安全隐患。 展开更多
关键词 ANDROID 安全机制 PERMISSION
下载PDF
浅谈司法公证材料的英译
5
作者 周永秀 毕研韬 《语言教育》 2002年第3期35-36,共2页
司法公证翻译因关系到当事人在境内外的权利和义务而应格外严谨准确。笔者近年来受有关部门及当事人的委托承担了部分公证材料的翻译,从各国签证官和国外机构获得了大量有益的信息反馈,现不揣冒昧从文体特征。
关键词 机构名称 信息反馈 语法方面 thereafter translated 语义模糊 大学外国语 WISDOM PERMISSION 发证日期
下载PDF
一类SCO OpenServer 5中远程访问故障的分析和处理
6
作者 黄宁 李岚 《江西科学》 2007年第1期79-80,85,共3页
提出一类SCO OpenServer 5中远程访问常见的问题,分析其原因,提出解决方法,找到了解决这类问题的关键。
关键词 远程访问 对等用户 Rcmd Rlogin PERMISSION Denied
下载PDF
基于权限管理的Android应用行为检测 被引量:8
7
作者 刘智伟 孙其博 《信息网络安全》 2014年第6期72-77,共6页
随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用A... 随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用Android系统Permission机制的动态检查模式实现应用运行时行为的检测。Android应用通过<user-permission>申请所需权限,在运行过程中需要调用对应的API或者访问系统数据时,会发生系统权限检查,从而实现对应用行为的监控。相对在应用层进行应用行为的监控要更简洁有效,通过在框架层的定制更好地实现了对应用行为的监控,同时带给系统的损耗更小。 展开更多
关键词 应用行为 Permission机制 权限动态检查
下载PDF
基于API和Permission的Android恶意软件静态检测方法研究 被引量:3
8
作者 杨鸣坤 罗锦光 +1 位作者 欧跃发 慕德俊 《计算机应用与软件》 北大核心 2020年第4期53-58,104,共7页
当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态... 当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态反编译,提取其中的静态信息;对静态信息中的API和Permission进行统计学分析,得到API和Permission在恶意APK和正常APK中的使用率;根据它们的使用率确定基准API和Permission集合,将每一个APK转换成可参与计算的关于API和Permission的特征向量;利用改进的k-NN分类器,对待检测的APK进行分类判定。实验结果表明,该方法可以有效地对APK进行恶意分类。 展开更多
关键词 ANDROID 恶意软件 静态检测 PERMISSION 机器学习
下载PDF
Key details of the duodenal-jejunal bypass in type 2 diabetes mellitus rats 被引量:5
9
作者 Li-Ou Han Chun Song +2 位作者 Chun-Fang Song Li-Hong Zhou Su-Jun Cheng 《World Journal of Gastroenterology》 SCIE CAS CSCD 2011年第45期5021-5027,共7页
AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastri... AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastric volume, a procedure in which gastrointestinal continuity was reestablished while excluding the entire duodenum and proximal jejunal loop. We observed the procedural success rate, long-term survival, and histopathological sequelae associated with a number of technical modifications. These included: use of anatomical markers to precisely identify Treitz's ligament; careful dissection along surgical planes; careful attention to the choice of regional transection sites; reconstruction using full-thickness anastomoses; use of a minimally invasive procedure with prohemostatic pretreatment and hemorrhage control; prevention of hypo-thermic damage; reduction in the length of the procedure; and accelerated surgical recovery using fast-track surgical modalities such as perioperative permissive underfeeding and goal-directed volume therapy. RESULTS: The series of modif ications we adopted reduced operation time from 110.02 ± 12.34 min to 78.39 ± 7.26 min (P < 0.01), and the procedural success rate increased from 43.3% (13/30) to 90% (18/20) (P < 0.01), with a long-term survival of 83.3% (15/18) (P < 0.01). CONCLUSION: Using a number of fast-track and damage control surgical techniques, we have successfully established a stable model of gastric bypass in diabetic rats. 展开更多
关键词 Duodenal-jejunal bypass Type 2 diabetes mellitus Minimally invasive surgery Fast-track surgery Damage control surgery Permissive underfeeding Goal-directed volume therapy
下载PDF
Permission and role automatic assigning of user in role-based access control 被引量:4
10
作者 韩道军 卓汉逵 +1 位作者 夏兰亭 李磊 《Journal of Central South University》 SCIE EI CAS 2012年第4期1049-1056,共8页
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th... Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient. 展开更多
关键词 role-based access control ROLE permission assignment concept lattice
下载PDF
POLLUTION TREND IN THE TUMEN RIVER AND ITS INFLUENCE ON REGIONAL DEVELOPMENT 被引量:2
11
作者 田卫 俞穆清 +1 位作者 王国平 郭传新 《Chinese Geographical Science》 SCIE CSCD 1999年第2期50-54,共5页
The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard poll... The Tumen River had failed to meet Grade Ⅲ and Ⅳ levels in the environmental quality standard for surface water, and had exceeded Grade Ⅴ level. Surface water pollution is serious. The major excessive standard pollutants were COD Mn and SS. After taking effective treatment steps, the worsening trend of water pollution will be basically under control. But the change of runoff in the Tumen River is large in a year, especially during as long as five month freezing period, smaller flow and lower temperature of river waters led to weak dilution and self purification capacity. The water quality of the Tumen River will not reach the appoint functional water quality standards, even if sewage meets discharge standard, which will influence water resources utilization in the lower reaches of the Tumen River and regional economic development. Therefore water pollution has become the major restrictive factor of the development of the Tumen River area. 展开更多
关键词 water POLLUTION environmental capacity permissible AMOUNT of WASTEWATER DISCHARGE the Tumen RIVER
下载PDF
Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair? 被引量:2
12
作者 Hyman M. Schipper 《Neural Regeneration Research》 SCIE CAS CSCD 2015年第2期208-210,共3页
'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, ... 'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues. 展开更多
关键词 GENE HO Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair GFAP
下载PDF
PermissibleWind Conditions for Optimal Dynamic Soaring with a Small Unmanned Aerial Vehicle 被引量:1
13
作者 Liu Duo-Neng Hou Zhong-Xi +2 位作者 Guo Zheng Yang Xi-Xiang Gao Xian-Zhong 《Computer Modeling in Engineering & Sciences》 SCIE EI 2016年第6期531-565,共35页
Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well a... Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed. 展开更多
关键词 DYNAMIC SOARING Permissible wind CONDITIONS TRAJECTORY optimization Unmanned AERIAL vehicle(UAV)
下载PDF
Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records 被引量:1
14
作者 Mueen Uddin M.S.Memon +4 位作者 Irfana Memon Imtiaz Ali Jamshed Memon Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2021年第8期2377-2397,共21页
Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare ind... Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem. 展开更多
关键词 Electronic health records blockchain hyperledger fabric patient data privacy private permissioned blockchain healthcare ecosystem
下载PDF
Irrigation erosion of irrigated soils in the foothills of southern Kazakhstan 被引量:1
15
作者 Abdulla S SAPAROV Enadiy K МIRZAKEEV +2 位作者 Tatyana M SHARYPOVA Galymzhan A SAPAROV Jilili ABUDUWAILI 《Journal of Arid Land》 SCIE CSCD 2013年第2期166-171,共6页
Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and t... Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils. 展开更多
关键词 irrigation erosion furrow irrigation structure-forming polymers deformation of furrows permissible water speed aggregate water stability
下载PDF
Defluoridation of Water by a Biomass: <i>Tinospora cordifolia</i> 被引量:1
16
作者 Piyush Kant Pandey Madhurima Pandey Rekha Sharma 《Journal of Environmental Protection》 2012年第7期610-616,共7页
This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to redu... This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit. 展开更多
关键词 SEQUESTRATION DEFLUORIDATION BIOSORPTION FT-IR Spectrum Permissible
下载PDF
Searchable Encryption with Access Control on Keywords in Multi-User Setting 被引量:2
17
作者 Lei Li Chungen Xu +2 位作者 Xiaoling Yu Bennian Dou Cong Zuo 《Journal of Cyber Security》 2020年第1期9-23,共15页
Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a ... Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a fine-grained and flexible access control mechanism.The main idea of this paper is to let the owner classify his data and then authorizes others according to categories.The cloud server maintains a permission matrix,which will be used to verify whether a trapdoor is valid or not.In this way we can achieve access control and narrow the search range at the same time.We prove that our scheme can achieve index and trapdoor indistinguishability under chosen keywords attack security in the random oracles. 展开更多
关键词 Searchable encryption access control cloud computing permission assignment
下载PDF
An Ordering Policy for Deteriorating Items with Time-Dependent Quadratic Demand and Salvage Value under Permissible Delay in Payment 被引量:1
18
作者 Trailokyanath Singh Madan Mohan Muduly +2 位作者 Chittaranjan Mallick Rahul Kumar Gupta Hadibandhu Pattanayak 《American Journal of Operations Research》 2019年第5期201-218,共18页
The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in th... The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in the inventory is subject to constant deterioration rate, demand rate is quadratic function of time and salvage value is associated with the deteriorated units. Shortages in the system are not allowed to occur. A mathematical formulation is developed when the supplier offers a permissible delay period to the customers under two circumstances: 1) when delay period is less than the cycle of time;and 2) when delay period is greater than the cycle of time. The method is suitable for the items like state-of-the-art aircrafts, super computers, laptops, android mobiles, seasonal items and machines and their spare parts. A solution procedure algorithm is given for finding the optimal order quantity which minimizes the total cost of an inventory system. The article includes numerical examples to support the effectiveness of the developed model. Finally, sensitivity analysis on some parameters on optimal solution is provided. 展开更多
关键词 Constant Deterioration RATE Deteriorating Items Economic Order Quantity Permissible Delay in PAYMENT SALVAGE Value TIME-DEPENDENT QUADRATIC DEMAND RATE
下载PDF
Blockchain Management in Smart Grid 被引量:1
19
作者 Mila Ilieva-Obretenova 《Management Studies》 2021年第4期280-288,共9页
Power Supply and Smart Grid represent specific business,which must be managed by permissioned(private)blockchain.Despite its disadvantages-time consuming,expensive,and losing from network effect-the permissioned block... Power Supply and Smart Grid represent specific business,which must be managed by permissioned(private)blockchain.Despite its disadvantages-time consuming,expensive,and losing from network effect-the permissioned blockchain offers balance,guarantees stability,and provides physical limitations for usage of validating nodes only in the network.The management of permissioned blockchain is necessary for tracing the processes in it.The author has represented the moment following topics:the idea for applying blockchain in business environment,blockchain technology-as a linked list with a new key on each step,node structure and information models for node management with a large granularity,detail models for node management with accent on configuration and performance and managed objects classes for installation of blockchain network with accent on security and performance,models for blockchain network management and five scenarios for blockchain transactions management.The paper represents a stage of project Blockchain in Smart Grid:describing of Managed Objects classes for functional areas of blockchain life cycle:Provision,Configuration,Maintenance,Security(developed),Accounting,Performance,and Subscriber control.The author uses the life cycle of telecommunications networks as a reference.The models are designed for user interface developers,university professors,and students. 展开更多
关键词 power supply smart grid permissioned(private)blockchain network effect validating nodes
下载PDF
细数iOS上的那些安全防护 被引量:2
20
作者 赵力 《计算机与网络》 2016年第17期50-51,共2页
随着苹果对iOS系统多年的研发,iOS上的安全防护机制也是越来越多,越来越复杂。这对于刚接触iOS安全的研究人员来说非常不友好,往往不知从何入手。因此,为了让大家能够更加系统性地了解iOS上的安全机制,以下从三个方面:代码签名(CodeS ... 随着苹果对iOS系统多年的研发,iOS上的安全防护机制也是越来越多,越来越复杂。这对于刚接触iOS安全的研究人员来说非常不友好,往往不知从何入手。因此,为了让大家能够更加系统性地了解iOS上的安全机制,以下从三个方面:代码签名(CodeS ign),沙盒机制(SandB ox)和利用缓解(Exploit Mitigation),对iOS的系统安全机制做了一个总结。希望能够给大家的学习以及研究带来一定的帮助。 展开更多
关键词 安全防护 IOS 系统安全 数字证书 动态库 apple TOKEN PERMISSION 缓冲区溢出 子进程
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部