参考文献/References:
[1] Burguera I,Zurutuza U,Nadjm-Tehrani S.Crowdroid:behavior-based malware detection system for Android[EB/OL].[2018-03-11].10.1145/2046614.2046619.
[2] Sun Lichao,Li Zhiqiang,Yan Qiben,et al.SigPID:significant permission identify-cation for android malware detection[EB/OL].[2018-03-09].http://doi.ieeecomputersociety.org/10.1109/MALWARE.2016.7888730.
[3] Arp D,Spreitzenbarth M,Hübner M,et al.DREBIN:Effective and explainable detection of android malware in your pocket[EB/OL].[2018-03-09].10.14722/ndss.2014.23247.
[4] GitHub,Inc.Androguard[EB/OL].[2018-03-09].https://github.com/androguard/androguard.
[5] Avdiienko V,Kuznetsov K,Gorla A,et al.Mining apps for abnormal usage of sensitive data[C].IEEE/ACM IEEE International Conference on Software Engineering,2015:426-436.
[6] 徐林溪,郭帆.基于混合特征的恶意安卓程序检测方法[J].计算机工程与科学,2017,39(10):1837-1846.
[7] Zhou Wu,Zhou Yajin,Grace Michael,et al.Fast,scalable detection of "Piggybacked" mobile applications[EB/OL].[2018-04-11〗.10.1145/2435349.2435377.
[8] Arzt S,Rasthofer S,Fritz C,et al.FlowDroid:precise context,flow,field,object-sensitive and lifecycle-aware taint analysis for Android apps[J].Acm Sigplan Notices,2014,49(6):259-269.
[9] Octeau D,Luchaup D,Dering M,et al.Composite constant propagation:application to Android inter-component communication analysis[C].IEEE/ACM IEEE International Conference on Software Engineering,2015:77-88.
[10] Google inc.Android官方权限说明[EB/OL].[2018-04-11].https://developer.android.google.cn/guide/topics/permissions/overview#viewing.
[11] Zhou Yajin,Jiang Xuxian.Dissecting Android Malware:characterization and Evolution[C].Security and Privacy(SP),2012 IEEE Symposium on,2012:95-109.
[12] Rasthofer S,Arzt S,Bodden E.A Machine-learning approach for classifying and categorizing Android sources and sinks[C].Network and Distributed System Security Symposium,2014.
[13] Google inc.Android应用基础知识[EB/OL].https://developer.android.google.cn/guide/components/fundamentals#Components.
[14] Google inc.Intent和Intent过滤器匹配规则[EB/OL].https://developer.android.google.cn/guide/components/intents-filters.
[15] Octeau D,Jha S,Mcdaniel P.Retargeting Android applications to Java bytecode[C].ACM Sigsoft International Symposiumon the Foundations of Software Engineering,2012:1-11.
[16] Waikato inc.WEKA[EB/OL].[2018-03-27].https://www.cs.waikato.ac.nz/ml/weka/.
[17] VirusShare.Because sharing is caring[EB/OL].[2018-05-11].https://virusshare.com/.