参考书目
[2] Android Security Discussions: Multiple Certi?cates and Upgrade process. Available Online. .
[3] Android Security Overview. Available Online. http://source.android.com/devices/tech/security/index.html .
[4] capabilities(7) - Linux man page. Available Online. .
[5] Jar File Speci?cation. Available Online. http://docs.oracle.com/javase/6/docs/technotes/guides/jar/jar.html .
[6] jarsigner - JAR Signing and Veri?cation Tool. Available Online. .
[8] System Permissions. Available Online. http://developer.android.com/guide/topics/security/permissions.html .
[9] The Android Open Source Project. Available Online. .
[10] Filesystem Hierarchy Standard, version 2.3. Available Online, January 2004. http://www.pathname.com/fhs/pub/fhs-2.3.html .
[11] Hao Chen, David Wagner, and Drew Dean. Setuid Demysti?ed. In Proceedings of the 11th USENIX Security Symposium, pages 171–190, 2002.
[12] Aleksandar Gargenta. Deep Dive into Android IPC/Binder Framework. Available Online. .
[14] Alex Lockwood. Binders & Window Tokens. Available Online, July 2013. http://www.androiddesignpatterns.com/2013/07/binders-window-tokens.html .
[15] Ketan Parmar. In Depth: Android Package Manager and Package Installer. Available Online, October 2012. .
[16] Thorsten Schreiber. Android Binder. Android Interprocess Communication. Master’s thesis, Ruhr University Bochum, 2011.
[17] Enea Android team. The Android boot process from power on. http://www.androidenea.com/2009/06/android-boot-process-from-power-on.html , June 2009. Available Online.
[18] Karim Yaghmour. Extending Android HAL. Available Online, September 2012. .
[20] Yury Zhauniarovich. Improving the security of the Android ecosystem. PhD thesis, University of Trento, April 2014. To appear in April 2015.