赵帅.苹果操作系统下应用程序的安全性研究[D].上海:上海交通大学,2012.ZHAO S.Research on Security of Mac OS X Applications[D].Shanghai:Shanghai Jiaotong University,2012(Ch).
[2]
刘北水.Mac OS X系统安全性研究[D].西安:西安电子科技大学,2013.LIU B S.Mac OS X System Security Research[D].Xi’an:Xidian University,2013(Ch).
[3]
LANDON F.Fixing ptrace on Mac OS X 10.5Leopard[DB/OL].[2008-02-17].http://landonf.org/code/macosx/Leopard_PT_DENY_ATTACH.20080122.html.
[4]
CHARLIE M,DINO D Z.The Mac Hacker’s Handbook[M].Indianapolis:Wiley Publishing Inc,2009.
[5]
VILAA P.Revisiting Mac OS X Kernel Rootkits[DB/OL].[2016-12-26].http://phrack.org/issues/69/7.html.
[6]
CARBON BLACK.The Most Prolific Year in History for OS X Malware[DB/OL].[2016-12-18].https://www.carbonblack.com/files/2015-the-most-prolificyear-for-os-x-malware/.
[7]
LEVIN J.Mac OS X and iOS Internals:To the Apple’s Core[M].Indianapolis:Wiley Publishing Inc,2013.
[8]
JOSEPH K.Designing BSD Rootkits:An Introduction to Kernel Hacking[M].San Francisco:No Starch Press,2007.
[9]
CLAUD X.New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer[DB/OL].[2016-03-06].http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-kerangerinfected-transmission-bittorrent-client-installer/.
[10]
汪方.Mac OS X终端数据泄露防护研究[D].武汉:华中科技大学,2013.WANG F.Research of MacOS X Endpoint Data Leak Prevention[D].Wuhan:Huazhong University of Science and Technology,2013(Ch).
[11]
WARDLE P.Methods of Malware Persistence on Mac OS X[DB/OL].[2014-10-26].https://www.virusbulletin.com/virusbulletin/2014/10/paper-methods-malware-persistence-mac-os-x.
[12]
VINCENT V M.Behavioural Detection and Prevention of Malware on OS X[DB/OL].[2016-09-29].https://www.virusbulletin.com/virusbulletin/2016/09/behavioural-detection-and-prevention-malware-os-x.