參考文獻 |
[1] J. Seo, D. Kim, D. Cho, T. Kim and I. Shin, "FLEXDROID: Enforcing In-App Privilege Separation in Android," Network and Distributed System Security Symposium (NDSS), 2016.
[2] M. C. Grace, W. Zhou, X. Jiang and A.-R. Sadeghi, "Unsafe exposure analysis of mobile in-app advertisements," Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, 2012.
[3] L. Li, T. F. Bissyandé, J. Klein and Y. Traon, "An Investigation into the Use of Common Libraries in Android Apps," Software Analysis, Evolution, and Reengineering (SANER), IEEE 23rd International Conference on, 2016.
[4] T. Book, A. Pridgen and D. S. Wallach, "Longitudinal Analysis of Android Ad Library," arXiv preprint arXiv:1303.0857, 2013.
[5] "Firm fined for angry birds mobile billing scam," [Online]. Available: http://ipkonfig.com/firm-fined-for-angry-birds-mobile-billing-scam.
[6] "Android Developer Reference, Fundamental Components.," [Online]. Available: https://developer.android.com/guide/components/fundamentals.html.
[7] "ART and Dalvik," [Online]. Available: https://source.android.com/devices/tech/dalvik/.
[8] "Normal and Dangerous Permissions," [Online]. Available: https://developer.android.com/guide/topics/permissions/requesting.html.
[9] "Compare with emulators," [Online]. Available: http://www.androidauthority.com/best-android-emulators-for-pc-655308/.
[10] B. Livshits and J. Jung, "Automatic mediation of privacy-sensitive," The Network and Distributed System Security Symposium (NDSS), 2013.
[11] R. Bhoraskar, S. Han, J. Jeon, T. Azim, S. Chen, J. Jung, S. Nath, R. Wang and D. Wetherall, "Brahmastra: Driving Apps to Test the Security of Third-Party Components," 23rd USENIX Security Symposium, 2014.
[12] J. Crussell, R. Stevens and H. Chen, "MAdFraud: investigating ad fraud in android applications," Proceedings of the 12th annual international conference on Mobile systems, applications, and services, 2014.
[13] J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang and G. Jiang, "SUPOR: Precise and Scalable Sensitive User Input," 24th USENIX Security Symposium, 2015.
[14] "Android Open Source Project emulators," [Online]. Available: https://source.android.com/source/building.
[15] "Android Developer Reference, ActivityManager.," [Online]. Available: https://developer.android.com/reference/android/app/ActivityManager.html.
[16] "Google Developers ,AdWords API ,Client Libraries," [Online]. Available: https://developers.google.com/adwords/api/docs/clientlibraries.
[17] W. Meng, R. Ding, S. P. Chung, S. Han and W. Lee, "The Price of Free:Privacy Leakage in Personalized Mobile In-App Ads," The Network and Distributed System Security Symposium, 2016.
[18] "Google Developers ,AdWords help, Targeting your ads," [Online]. Available: https://support.google.com/adwords/answer/1704368?hl=en.
[19] "Android Developer Reference, ContextWrapper.," [Online]. Available: https://developer.android.com/reference/android/content/ContextWrapper.html.
[20] "Android Developer Reference, Activity.," [Online]. Available: https://developer.android.com/reference/android/app/Activity.html.
[21] "Android Open Source Project," [Online]. Available: https://source.android.com/.
[22] "Google Play store," [Online]. Available: https://play.google.com/store?hl=zh_TW.
[23] "AnTuTu-Benchmark," [Online]. Available: http://www.antutu.com/.
[24] "K9 Mail," [Online]. Available: https://k9mail.github.io/. |