Citation: | ZHANG Wen, SU Ningning, NIU Shaozhang, et al., “A Novel Hotfix Scheme for System Vulnerability Based on the Android Application Layer,” Chinese Journal of Electronics, vol. 28, no. 2, pp. 408-415, 2019, doi: 10.1049/cje.2019.01.002 |
Internet Society of China, “China Mobile Internet development and security reports(2017)”. 2017.
|
OpenSignal. Android Fragmentation 2015. 2015.
|
Wang K, Zhang Y and Liu P, “Call me back!: Attacks on system server and system apps in android through synchronous callback”, ACM Sigsac Conference on Computer and Communications Security, ACM, pp.92-103, 2016.
|
Zhang X, Aafer Y, Ying K, et al., “Hey, you, get off of my image: Detecting data residue in android images”, European Symposium on Research in Computer Security, Springer International Publishing: pp.401-421, 2016.
|
Aafer Y, Zhang X and Du W, “Harvesting inconsistent security configurations in custom android ROMs via differential analysis”, USENIX Security Symposium, pp.1153-1168, 2016.
|
Sounthiraraj D, Sahs J, Greenwood G, et al., “SMVHUNTER: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in android apps”, Network and Distributed System Security Symposium, 2014.
|
Chen Yue, “Adaptive android kernel live patching”, Usenix Security, 2017.
|
Zhang H., She D. and Qian Z., “Android ION hazard: The curse of customizable memory management system”, ACM Sigsac Conference on Computer and Communications Security, pp.1663-1674, 2016.
|
Zhang X, et al., “Embroidery: Patching vulnerable binary code of fragmentized android devices”, IEEE International Conference on Software Maintenance and Evolution IEEE, pp.47-57, 2017.
|
Huang H., Zhu S., Chen K., et al., “From system services freezing to system server shutdown in android: All you need is a loop in an app” ACM Sigsac Conference on Computer and Communications Security, ACM, pp.1236-1247, 2015.
|
Lee B, Lu L, Wang T, et al., “From Zygote to Morula: Fortifying Weakened ASLR on Android”, Security and Privacy, IEEE, pp.424-439, 2014.
|
Xu W, Li J, Shu J, et al., “From collision to exploitation: Unleashing use-after-free vulnerabilities in Linux kernel”, ACM Conference on Computer and Communications Security, pp.414-425, 2015.
|
Fang Z, Han W and Li Y, “Permission based android security: Issues and countermeasures”, Computers & Security, Vol.43, No.6, pp.205-218, 2014.
|
Aafer Y, Zhang N, Zhang Z, et al., “Hare hunting in the wild android: A study on the threat of hanging attribute references”, ACM Sigsac Conference on Computer and Communications Security, ACM, pp.1248-1259, 2015.
|
http://cve.mitre.org/
|
Google. Android Security Official, https://source.android.com/security/advisory/.
|
Zhang Y, Li Z, Dong G, et al., “Novel taxonomy of security weakness in source code based on three-dimension tree model”, Computer Science, Vol.43, No.5, pp.76-79, 2016.
|