参考书目

    [2] Android Security Discussions: Multiple Certi?cates and Upgrade process. Available Online. .

    [3] Android Security Overview. Available Online. http://source.android.com/devices/tech/security/index.html .

    [4] capabilities(7) - Linux man page. Available Online. .

    [5] Jar File Speci?cation. Available Online. http://docs.oracle.com/javase/6/docs/technotes/guides/jar/jar.html .

    [6] jarsigner - JAR Signing and Veri?cation Tool. Available Online. .

    [8] System Permissions. Available Online. http://developer.android.com/guide/topics/security/permissions.html .

    [9] The Android Open Source Project. Available Online. .

    [10] Filesystem Hierarchy Standard, version 2.3. Available Online, January 2004. http://www.pathname.com/fhs/pub/fhs-2.3.html .

    [11] Hao Chen, David Wagner, and Drew Dean. Setuid Demysti?ed. In Proceedings of the 11th USENIX Security Symposium, pages 171–190, 2002.

    [12] Aleksandar Gargenta. Deep Dive into Android IPC/Binder Framework. Available Online. .

    [14] Alex Lockwood. Binders & Window Tokens. Available Online, July 2013. http://www.androiddesignpatterns.com/2013/07/binders-window-tokens.html .

    [15] Ketan Parmar. In Depth: Android Package Manager and Package Installer. Available Online, October 2012. .

    [16] Thorsten Schreiber. Android Binder. Android Interprocess Communication. Master’s thesis, Ruhr University Bochum, 2011.

    [17] Enea Android team. The Android boot process from power on. http://www.androidenea.com/2009/06/android-boot-process-from-power-on.html , June 2009. Available Online.

    [18] Karim Yaghmour. Extending Android HAL. Available Online, September 2012. .

    [20] Yury Zhauniarovich. Improving the security of the Android ecosystem. PhD thesis, University of Trento, April 2014. To appear in April 2015.