[1] Gartner. Gartner Says Worldwide Mobile Payment Transaction Value to Surpass $235 Billion in 2013[EB/OL]. http://www.gartner.com/newsroom/id/2504915,2013-06-04. [2] McAfee. Security for Military-Grade Google Android Devices[EB/OL]. http://www.mcafee.com/sg/resources/solution-briefs/sb-security-military-grade-Android.pdf, 2013. [3] Zhou, Y., & Jiang, X. Dissecting android malware: Characterization and evolution[C]In 2012 IEEE Symposium on Security and Privacy. 2012. 95-109. [4] NVD. Vulnerability Summary for CVE-2011-1149[EB/OL]. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1149, 2011-04-22. [5] NVD. Vulnerability Summary for CVE-2011-1823[EB/OL]. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1823, 2011-04-25. [6] NVD. Vulnerability Summary for CVE-2011-3874[EB/OL]. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3874, 2012-02-06. [7] Duo Security[EB/OL]. http://www.xray.io/,2014-08-06. [8] Felt, A. P., Wang, H. J., Moshchuk, A., Hanna, S., & Chin, E.. Permission Re-Delegation: Attacks and Defenses[C] In20th USENIX Security Symposium. 2011. [9] Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A. R., &Shastry, B. Towards taming privilege-escalation attacks on Android[C] In 19th Annual Symposium on Network and Distributed System Security, 2012. [10] 雷灵光,张中文,王跃武,等. Android系统代码签名验证机制的实现及安全性分析[J].信息网络安全,2012,(08):61-63. [11] Han, J., Yan, Q., Gao, D., Zhou, J., & Deng, R. Comparing Mobile Privacy Protection through Cross-Platform Applications[C]In 20th Annual Symposium on Network and Distributed System Security, 2013. [12] Wikipedia. Mobile cyber-physical systems [EB/OL]. http://en.wikipedia.org/wiki/Cyber-physical_system#Mobile_cyber-physical_systems, 2011-02-21. [13] Schlegel, R., Zhang, K., Zhou, X. Y., Intwala, M., Kapadia, A., & Wang, X. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones[C]In 18th Annual Symposium on Network and Distributed System Security, 2011. [14] R. Templeman, Z. Rahman, D. Crandall, andA. Kapadia. PlaceRaider: Virtual Theft in PhysicalSpaces with Smartphones[C] In 20th Annual Symposium on Network and DistributedSystems Security,2013. [15] Marquardt, P., Verma, A., Carter, H., &Traynor, P. iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers[C] In 18th ACM conference on Computer and Communications Security, 2011. [16] Arapinis, M., Mancini, L., Ritter, E., Ryan, M., Golde, N., Redon, K., &Borgaonkar, R. New privacy issues in mobile telephony: fix and verification[C] In 19th ACM Conference on Computer and Communications Security, 2012. [17] Fahl, S., Harbach, M., Muders, T., Smith, M., Baumgärtner, L., &Freisleben, B. Why Eve and Mallory love Android: An analysis of Android SSL (in) security[C] In 19th ACM Conference on Computer and Communications Security, 2012. |