參考文獻 |
[1]
“Smartphone OS,” IDC, [線上 ]. Available: https://www.idc.com/promo/smartphone-market-share/os. [存取日期 : 6 7 2018].
[2]
A. Studio, "Android Debug Bridge (adb)," [Online]. Available: https://developer.android.com/studio/command-line/adb. [Accessed 3 7 2018].
[3]
F. Chung, "Security Enhancements in Jelly Bean," 14 2 2013. [Online]. Available: https://android-developers.googleblog.com/2013/02/security-enhancements-in-jelly-bean.html. [Accessed 6 7 2018].
[4]
“ADB Shell,” 2015. [線上 ]. [存取日期 : 6 7 2018].
[5]
J. S. Marcus Niemietz, "UI Redressing Attacks on Android Devices," in blackhat ASIA, 2014.
[6]
G. Developers, "PackageManager," [Online]. Available: https://developer.android.com/reference/android/content/pm/PackageManager. [Accessed 6 7 2018].
[7]
G. Developers, "PackageInstaller," [Online]. Available: https://developer.android.com/reference/android/content/pm/PackageInstaller. [Accessed 6 7 2018].
[8]
Cstsinghua, "Android安? APK?解 ," 13 6 2016. [Online]. Available: https://cstsinghua.github.io/2016/06/13/Android%E5%AE%89%E8%A3%85APK%E8%AF%A6%E8%A7%A3/. [Accessed 6 7 2018].
[9]
"Android6.0 Framework分析 ——應用程序 APP的安裝過程 ," 6 11 2016. [Online]. Available: http://www.itread01.com/articles/1478404538.html. [Accessed 6 7 2018].
[10]
"Google Play," Google, [Online]. Available: https://play.google.com/store?hl=zh_TW. [Accessed 6 7 2018].
[11]
G. I. I. P. LIMITED, "Free Fire," Google Play, [Online]. Available: https://play.google.com/store/apps/details?id=com.dts.freefireth. [Accessed 6 7 2018].
[12]
E. ARTS, "FIFA Soccer," APKpure, [Online]. Available: https://apkpure.com/fifa-17-fifa-mobile-soccer/com.ea.gp.fifamobile. [Accessed 5 7 2018].
[13]
"APKPure," APKPure, [Online]. Available: https://apkpure.com/. [Accessed 6 7 2018].
[14]
G. Developers, "Permissions overview," [Online]. Available: https://developer.android.com/guide/topics/permissions/overview. [Accessed 6 7 2018].
[15]
T. Vidas, D. Votipka and N. Christin, "All Your Droid Are Belong To Us: A Survey of
34
Current Android Attacks," in WOOT′11 Proceedings of the 5th USENIX conference on Offensive technologies, 2011.
[16]
Z. Wei, Y. Chao and C. Yunfang, "Android’s External Device Attack: Demonstration and Security Suggestions," International Journal of Security and Its Applications, pp. 317-326, 2015.
[17]
J. Amarante and J. P. Barros, "Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge," Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE), pp. 572-577, 2017.
[18]
A. Pereira, M. Correia and P. Brandao, "USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations," IFIP International Conference on Communications and Multimedia Security, pp. 19-32, 2014.
[19]
"AVG Free," AVG Technologies, [Online]. Available: http://free.avgtaiwan.com/. [Accessed 6 7 2018].
[20]
C.-C. Lin, H. Li, X. Zhou and X. Wang, "Screenmilker: How to Milk Your Android Screen for Secrets," in NDSS, 2014.
[21]
L. Yang, L. Wang and D. Zhang, "Malicious Behavior Analysis of Android GUI Based on ADB," in IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017.
[22]
S. Hwang, S. Lee, Y. Kim and S. Ryu, "Bittersweet ADB: Attacks and Defenses," Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 579-584, 2017.
[23]
M. Xu, W. Sun and M. Alam, "Security enhancement of secure USB debugging in Android system," in Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), 2015.
[24]
J. Oberheide, E. Cooke and F. Jahanian, "CloudAV: N-Version Antivirus in the Network Cloud," in USENIX Security ′08, 2008. |