최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.1, 2021년, pp.73 - 81
When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functio...
Jae Keun Lee and Eul Gyu Im. "A Study on the Exception About Android Sandbox systems," Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp.784-785, 2012.
Google, Android - Google Play Protect, "https://www.android.com/intl/ko_kr/play-protect/," last accessed Oct 2020.
Mohamed Sabt, Mohammed Achemlal and Abdelmadjid Bouadballah. "Trusted Execution Environment: What It Is, and What It Is Not," 2015 IEEE Trustcom/BigDataSE/ISPA, vol.1, IEEE, 2015.
Tayde, Suchita and Seema Siledar. "File Encryption, Decryption Using AES Algorithm in Android Phone," International Journel of Advanced Research in computer science and software engineering, vol.5, no.5, pp.550-554, 2015.
Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh and Lorenzo Cavallaro. "The evolution of android malware and android analysis techniques," ACM Computing Surveys (CSUR) vol. 49, no.4, pp.1-41, 2017.
Saba Arshad, Abid Khan, Munam Ali Shah and Mansoor Ahmed. "Android malware detection & protection: a survey," International Journal of Advanced Computer Science and Applications vol.7. no.2. pp.463-475. 2016.
Jin a Kang and Hyoungshick Kim. "A Study on Application Permissions for Android Devices," Journal of the Korean Information Science Society, pp.808-810, 2013.
Google, VirusTotal, "https://www.virustotal.com/," last accessed Oct 2020.
Jun Li, Lidong Zhai, Xinyou Zhang and Daiyong Quan. "Research of android malware detection based on network traffic monitoring," 2014 9th IEEE Conference on Industrial Electronics and Applications, IEEE, 2014.
Payet, Etienne and Fausto Spoto. "Static analysis of Android programs," Information and Software Technology vol.54, no.11, pp.1192-1201, 2012.
Zarni Aung and Win Zaw. "Permission-based android malware detection," International Journal of Scientific & Technology Research, vol.2, no.3, pp,228-234, 2013.
Chengcheng Wang and Yuquing Lan. "PFESG: Permission-based Android Malware Feature Extraction Algorithm," Proceedings of the 2017 VI International Conference on Network, Communication and Computing, pp.106-109, 2017.
Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim and Brent Byunghoon Kang. "SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment," NDSS, 2015.
Konstantin Rubinov, Lucia Rosculete, Tulika Mitra and Abhik Roychoudhury. "Automated partitioning of android applications for trusted execution environments," 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), IEEE, 2016.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.