[1] JUNIPER. 2011 Mobile Threats Report[Z]. Juniper Networks, Tech.Rep, 2012.
[2] GOASDU L, PETTEY C. Gartner Says Worldwide Smartphone Sales Soared in Fourth Quarter of 2011 with 47 Percent Growth[EB/OL].(2015-01-15)[2017-01-11]. http://www.gartner.com/it/page.jsp?id =1924314.
[3] 张锐.Android环境下恶意软件静态检测方法研究[D]. 重庆: 重庆大学, 2014.
[4] 戚湧.安卓移动智能终端的恶意软件检测与分析方法[D].南京:南京理工大学, 2014.
[5] 吴凌飞. 恶意软件变种间相似度的分析技术研究[D]. 杭州:杭州电子科技大学, 2014.
[6] SPITZNER L. Honeypot: Tracking Hackers[M]. 北京:清华大学出版社, 2004: 30-35.
[7] 诸葛建伟,唐勇, 韩心慧.蜜罐技术研究与应用进展[J].软件学报,2013, 24(4): 825-842.
[8] DEDIU H. When Will Tablets Outsell Traditionalpcs March 2012[EB/OL]. (2012-03-02)[2017-01-11].http://www.asymco.com/2012/03/02/.
[9] DUNHAM K. Mobile malware attacks and defence[J]. Elsevier, 2009, 7(3): 137-146.
[10] DESNOSA. Androguard Reverse Engineering Tool[EB/OL].(2012-12-04)[2017-01-11]. http://code.google.com/p/androguard/.
[11] CESARE S, XIANG Y. Classification of Malware Using Structured Control Flow[C]//Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing, Australian Computer Society,2010:61-70.
[12] RODRIGUEZ GONZALEZ A Y, MARTINEZ TRINIDADJ F, CARRASCO OCHOA J A, et al. Mining frequent patterns and association rules using similarities[J]. Expert Systems with Application, 2013, 40(17):6823- 6836.