2Gartner. Gartner says android to command nearly half of worldwide smar-tphone operating system market by year-end 2012 [ EB/OL]. [2012-12-18]. http://www. gartner. com/newsroom/id/1622614, April 2011.
3Kellogg D. In U. S. Market, New Smartphone Buyers Increasingly Em-bracing Android [ R/OL]. [ 2012 - 12 -18]. http://blog, nielsen.com/nielsenwire/online 一 mobile/in-u-s-market-new-smartphone-buy-ers-increasingly-embracing-android/. 2011.
4Malicious Mobile Threats Report 2010/2011, White paper, Juniper Net-works Global Threat Center Research [ R/OL ]. [ 2012 - 12 - 19]. ht-tp ://www. juniper, net/us/en/local/pdf/whitepapers/2000415 -en. pdf.
5Kiyomoto S, Fukushima K,Tanaka T. A Formal Model to Analyze thePermission Authorization and Enforcement in the Android Framework[C ]//Second International Conference on Social Computing ( Social-Com) ,2010:944-951.
6Au K,Zhou B,Huang Z,et ai. Short Paper: A Look at SmartPhone Per-mission Models [ C ] //Proceedings of the ACM Workshop on Securityand Privacy in Mobile Devices (SPSM) ,2011.
7Zhaohui Wang, Gagnon C, Stavrou A. Analysis of Android Applica-tions * Permissions [ C ]//Sixth International Conference on SoftwareSecurity and Reliability Companion ( SERE-C),2012:45 - 46.
8Csfahani N,Kacem T, Mahmood R,et al. A Framework for AutomatedSecurity Testing of Android Applications on the Cloud [ C ] //Sixth In-ternational Conference on Software Security and Reliability Companion(SERE-C) ,2012:35-36.
9Rassameeroj I, Tanahashi Y. Various approaches in analyzing Androidapplications with its permission-based security models [ C ]//Interna-tional Conference on Electro/Information Technology ( EIT) , 2011 : 1-6.
10Radev D R, Hatzivassiloglou V, McKeown K R. A description of the CI-DR system as used for TDT-2 [ C ] //DARPA broadcast news workshop.Hemdon,V irginia, 1999.