作者: Thomas Bläsing , Leonid Batyuk , Aubrey-Derrick Schmidt , Seyit Ahmet Camtepe , Sahin Albayrak
DOI: 10.1109/MALWARE.2010.5665792
关键词: Mobile computing 、 Android (operating system) 、 Embedded system 、 Linux kernel 、 Operating system 、 Malware 、 Cloud computing 、 Mobile malware 、 Mobile device 、 Sandbox (computer security) 、 Computer science
摘要: … After that, applications are executed and can be used within the sandbox … sandbox is presented. Section 4 presents possible analysing procedures that can be performed in our sandbox…