其他1. | (201112)。Android Security Overview,http://source.android.com/tech/security/index.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
2. | Lockheimer, H.(201202)。Android and Security,http://googlemobile.blogspot.com/2012/02/android-and-security.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
3. | (201201)。SEAndroid Project Page,http://selinuxproject.org/page/SEAndroid。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
4. | Jiang, X.(201108)。GingerMaster: First Android Malware Utilizing a Root Exploit on Android 2.3 (Gingerbread),http://www.cs.ncsu.edu/ faculty/jiang/GingerMaster。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
5. | Fedler, R.,Banse, C.,Krauss, C.,Fusenig, V.(201205)。Android OS Security: Risks and Limitations,http://www.aisec.fraunhofer.de/content/dam/aisec/de/pdf/tech%20reports/AISEC-TR-2012-001 -Android-OS-Security.pdf。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
6. | Lineberry, A.,Richardson, D.,Wyatt, T.(20100818)。These Aren’t The Permissions You Are Looking For,https://www.defcon.org/images/defcon-18/dc-18-presentations/Lineberry/DEFCON-18-Lineberry-Not-The-Permissions-You-Are-Looking-For.pdf。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
7. | Vidas, T.,Votipka, D.,Christin, N.(201108)。All your droid are belong to us: A survey of current android attacks,http://static.usenix.org/event/woot/tech/final_files/Vidas.pdf。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
8. | Cannon, T.(201112)。No-permission android app gives remote shell,http://viaforensics.com/security/nopermission-android-app-remote-shell.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
9. | Grace, M.,Zhou, Y.,Wang, Z.,Jiang, X.(201202)。Systematic Detection of Capability Leaks in Stock Android Smartphones,http://www.csc.ncsu.edu/faculty/jiang/pubs/NDSS12_WOODPECKER.pdf。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
10. | Qiu, Y.(201211)。Bypassing Android Permissions: What You Need to Know,http:/Mog.tondmicro.coin/trendlabs-security_intelligence/bypassing-android-permissions-whatyou-need-to-know/。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |