共 50 条
- [22] Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories IEEE ACCESS, 2022, 10 : 24240 - 24254
- [24] How much does a zero-permission Android app know about us? THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
- [25] A Tale of Four Gates Privilege Escalation and Permission Bypasses on Android Through App Components COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 233 - 251
- [28] ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph Science China Information Sciences, 2023, 66
- [29] Practical Static Analysis of Detecting Intent-based Permission Leakage in Android Application 2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1953 - 1957
- [30] Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 706 - 713