Weiping WEN, Yang TANG, Li SHEN. An APP Sensitive Behaviors Detection Method Based on Android Kernel and Its Implementation[J]. Netinfo Security, 2016, 16(8): 18-23.
ZHAO Kao, ZOU Deqing, JIN Hai, et al.Privacy Protection for Perceptual Applications on Smartphones[C]//IEEE.2015 IEEE International Conference on Mobile Services (MS),June 27-July 2, 2015. New York City, NY, USA.NJ:IEEE,2015:174-181.
[2]
张航. 基于系统调用的文件系统入侵检测的设计与实现[D].武汉:华中科技大学,2009.
[3]
SETH S, VENKATESULU M A. sk_buff and Protocol Headers[M]// TCP/IP Architecture, Design, and Implementation in Linux. NJ: Wiley-IEEE Press, 2008: 181-203.
[4]
SURIARACHCHI A.Achieving High-throughput Distributed, Graph-based Multi-stage Stream Processing[D]. Fort Collins: Colorado State University, 2016.
[5]
落红卫. 移动恶意代码分析及检测技术研究[J]. 中国多媒体通信, 2015(7):36-37.
[6]
BERMAN A, BOURASSA V, SELBERG E. TRON: Process-Specific File Protection for the UNIX Operating System[EB/OL]., 2016-03-21.