| Filename | Size | Update |
|---|
| In English |
| ..........\A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.pdf |
| ..........\A methodology for empirical analysis of permission-based security models and its application to Android.pdf |
| ..........\A Methodology for Empirical Analysis of.pdf |
| ..........\A Study of Android Application Security.pdf |
| ..........\An Android runtime security policy enforcement framework.pdf |
| ..........\Analysis and research of system security based on android.pdf |
| ..........\Analysis of android applications' permissions.pdf |
| ..........\Android forensics -investigation | analysis and mobile security for Google Android.pdf |
| ..........\Android permission re-delegation detection and test case generation.pdf |
| ..........\Android Permissions A Perspective Combining Risks and.pdf |
| ..........\Android Permissions User Attention | Comprehension | and Behavior.pdf |
| ..........\Android Security Architecture.pdf |
| ..........\Android Security Permissions –Can We Trust Them.pdf |
| ..........\AndroidLeaks Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale.pdf |
| ..........\Apex Extending Android Permission Model and Enforcement with User-defined Runtime Constraints.pdf |
| ..........\Apex-Extending Android Permission Model and.pdf |
| ..........\Extending Android Security Enforcement with a Security Distance Model.pdf |
| ..........\Flexible data-driven security for Android.pdf |
| ..........\Google Android-An Updated Security Review.pdf |
| ..........\Improving Android Security with Layered.pdf |
| ..........\Modeling and enhancing Android's permission system.pdf |
| ..........\Modeling and Enhancing Android’s Permission System (2).pdf |
| ..........\On Lightweight Mobile Phone Application Certification.pdf |
| ..........\Permission Evolution in the Android Ecosystem.pdf |
| ..........\Permission-Based Abnormal Application Detection for Android.pdf |
| ..........\Privacy policy modelling and analysis for android applications.pdf |
| ..........\PScout Analyzing the Android Permission Specification.pdf |
| ..........\PUPDroid - Personalized user privacy mechanism for android.pdf |
| ..........\Runtime Verification Meets Android Security.pdf |
| ..........\Security mechanism analysis of open-source....pdf |
| ..........\Short Paper Enhancing Users’ Comprehension of Android.pdf |
| ..........\Towards formal analysis of the permission-based security model for Android.pdf |
| ..........\Towards Permission-Based Attestation for the Android Platform.pdf |
| ..........\Various approaches in analyzing Android applications with its permission-based security models.pdf |
| ..........\YAASE Yet Another Android Security Extension.pdf |
| ..........\相关资料网址.txt |