Hijacking Activity Technology Analysis and Research in Android System

作者: Yunlong Ren , Yue Li , Fangfang Yuan , Fangjiao Zhang

DOI: 10.1007/978-3-662-43908-1_6

关键词: Android (operating system)ExploitHuman–computer interactionTechnology analysisComputer scienceAndroid application

摘要: … Since Android is open, as many as people begin to pay close attention to Android, such as the program developer, the users. In this paper, on the basis of an Android application …

参考文章(5)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel, Semantically rich application-centric security in Android Security and Communication Networks. ,vol. 5, pp. 658- 673 ,(2012) , 10.1002/SEC.360
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner, Android permissions demystified Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 627- 638 ,(2011) , 10.1145/2046707.2046779
Zhang Chao, Design and implement of Binder extension model based on Android inter-process communication Journal of Xi'an University of Posts and Telecommunications. ,(2013)