10.07.2015 Views

dissertation

dissertation

dissertation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[84] Mark Russinovich. Inside Win2K NTFS, Part 1. http://msdn.microsoft.com/en-us/library/ms995846.aspx, retrieved 2012-07-10.[85] Thorsten Schreiber. Android Binder: Android interprocess communication.Technical report, Ruhr-Universität Bochum, October 2011.[86] National Security Agency. Security-Enhanced Linux. http://www.nsa.gov/research/selinux/index.shtml, retrieved 2012-06-24.[87] Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, and ToshiakiTanaka. Towards formal analysis of the permission-based security modelfor Android. In Proceedings of the Fifth International Conference onWireless and Mobile Communications, pages 87–92, August 2009.[88] Free Software Foundation. Various licenses and comments about them.http://www.gnu.org/licenses/license-list.html, retrieved 2012-06-24, 2012.[89] Open Source Initiative. Open source licenses. http://www.opensource.org/licenses/alphabetical, retrieved 2012-06-24.[90] Chris Soyars. CMStats—What it is, and why you should optin.http://www.cyanogenmod.com/blog/cmstats-what-it-is-andwhy-you-should-opt-in,retrieved 2012-06-24, March 2011.[91] Didier Stevens. XORSearch. http://blog.didierstevens.com/programs/xorsearch/, retrieved 2012-09-01.[92] Vrizlynn L.L. Thing, Kian-Yong Ng, and Ee-Chien Chang. Live memoryforensics of mobile phones. Digital Investigation, 7, Supplement:S74–S82, 2010. Proceedings of the Tenth Annual Digital Forensics ResearchWorkshop Conference.[93] Linus Torvalds. Linux 2.6.0-test3. E-mail to linux-kernel mailing list,archived at https://lkml.org/lkml/2003/8/9/4, retrieved 2012-06-24, August 2003.148

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!