• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    MobiGemini: Sensitive-Based Data and Resource Protection Framework for Mobile Device

    2017-05-09 01:39:17ShuangxiHongChuanchangLiuBoChengBingfeiRenJunliangChen
    China Communications 2017年7期

    Shuangxi Hong, Chuanchang Liu, Bo Cheng, Bingfei Ren, Junliang Chen

    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

    * The corresponding author: email: hongshuangxi_2008@126.com

    I. INTRODUCTION

    In recent years, with the development of scienti fic technology, smartphone is getting more and more powerful than the past, many people use it as a main tool for daily telephone, web browsing, and financial transactions. Therefore, number of smartphone user present exponential increase. According to a statista report[1], user increased from 1.06 billion to 1.76 billion between 2012 and 2014. Especially,fast developing of the mobile internet, mobile payment has been a hot spots. According to statistic of iResearch [2], the scale will reach 1358.4 billion by 2016. These data show it has become a trend using smartphone for payment. For example, AliPay (the most popular payment APP in China). Thus, smartphone as a necessary communication tool to user stores a large amount of sensitive-data of user,smartphone security was naturally focused on by most user. For this, major mobile operating system manufacturers have integrated some protection measures, for instance, screen lock,Biological recognition technology [3] ( fingerprint identi fication and face recognition), full disk encryption (FDE) [4] and so on. Google adds protecting measure of FDE in Android 3.0(only tablet), all version enabling FDE since android 4.0.

    Android FDE is an important progress for smartphone security. This solution have very good effect when smartphone was lost or stolen. however, in a certain case, FDE cannot work well for sensitive data protection, for example, Hong Kong kidnaping hostage event,they may coerce hostage to hand over paying password for transferring cash from an account of bank to another if the kidnappers find mobile payment software on smartphone of the victim. Thus, when owner of smartphone is caught and coerced into disclosing his/her PIN or key of screen locker (which is known as coercive attack), simple full disk encryption is not adequate for preventing leakage of privacy data on the mobile device.

    Plausibly deniable encryption (PDE) [5] is a better solution which reduces coercive attack by denying existence of sensitive data than FDE. Deniable encryption is a critical feature in a certain environment. Such as, victim may provide a decoy key for the adversary by a reasonable way when it are coerced to hand over decryption key. Originally, deniable encryption is used to network communication among multiple parties at first by Ran Canetti et al [6]. Some existing solutions with PDE function were used to mainline desktop operating system, such as TrueCrypt[7] and Freeotfe[8]. They implement PDE feature by enabling hidden volume. However, there are few solutions with PDE on mobile platforms.For all we know, Mobi flage[9] is the first PDE scheme for smartphone by modifying source codes of android full disk encryption. a smartphone enabling Mobiflage works at one of two modes, standard mode or PDE mode, the former is used to manage daily data generated by owner, and accessing the mode by entering public password which may be disclosed in emergency; the latter is used to supervise sensitive-data which need to be denied existence,such as photo or video took by journalist for forensics of accident, the mode may be entered by inputting another privacy password.Smartphone should be in the standard mode in everyday use to user, however, getting into PDE mode when needing to store sensitive data. MobiHydra[10] is another solution which reduces coercive attack by denying existence of privacy data, it introduces multiple-level deniable function based on Mobi flage design(in other words, MobiHdra has multiple hidden volumes for offering multiple-level deniability).

    In order to protect common users and owner of device or forensic workers, the authors propose MobiGemini to help them avoid the coercive attack in this paper.

    Although Mobiflage and MobiHydra initiate the relevant research of PDE on the mobile platform, both have some common limitations. First of all, they don’t protect sensitive APP (such as AliPay) in the standard mode,payment APP was usually installed under the standard mode in terms of convenience. The adversary may coerce user to transfer funds from one account to another account when he find mobile payment APP due to in the standard model of smartphone most of the time.Second, Mobi flage and MobiHydra store master key encrypted by LockScreen password at beginning offset of hidden volume. this may incur master key to be overwrited by stored data across boundary of volume When user write data to disk in the standard mode, it will destroy the master key to incur loss of all sensitive data in hidden volume. Third, Mobi flage and MobiHydra implement PDE by building hidden volume into free area of userdata partition, this introduces a new risk that data in the standard mode could corrupt hidden volume data. MobiHydra has a more serious question about across boundary of volume than Mobiflage, since it has multiple hidden volume.

    In our works, we consider security of smartphone from two mode based on the existing PDE solutions, and proposing Mobi-Gemini, a more reliable and convenient PDE storage encryption system for android mobile device. Our MobiGemini can prevents sensitive APP from leakage of accounts information of device owner by uninstalling corresponding APP, the feature makes up for defects of previous PDE solutions, we also improve storing way of master key to make it more secure. At the same time, we also take some measures to overcome corrupting data across the boundary of volume.

    In this paper, we have done the following some works:

    1. We explore some sensitive APP witch increase coercive attacks in the standard mode,and providing an interface of system service(working at framework layer) that implement uninstalling applications. This alleviate coercive attacks when smartphone of owner works in the standard mode.

    2. We provide MobiGemini, the more reliable PDE scheme based on existing PDE solution of mobile platforms, it overcomes some limitations that there were corrupting privacy data in previous existing PDE solution and improve storage way of master key of hidden volume. This makes the privacy data more security stored in a hidden volume than previous PDE scheme.

    3. We analyze systematically MobiGemini’s security features and reliability, while we perform MobiGemini’s the prototype system on Samsung Galaxy S4 smartphone powered by android 4.4.2 and have evaluated its performance.

    II. BACKGROUND AND RELATED WORK

    About this section, we explain simply whole android framework and expound data hiding[11] and deniable encryption, giving an overview of encryption built into major desktop operating system and evolution of full disk encryption on mobile platforms.

    Android provides an open source platform and applications context for smart device. It is divided into four layers, namely, application layer, application framework layer, HAL layer,Linux kernel layer. The application framework layer is responsible for providing services to the application layer and regulates applications on the android. Especially PackageManager service is in charge of installing or uninstalling of application, and checking permission of application.

    The mainline desktop operating system enable the full disk encryption to protect privacy data of user. For example, Windows BitLocker [12] is enabled by major windows system. Famous data hiding software such as Elettra,TrueCrypt and FreeOTFE that provide PDE function[13]. Elettra [14] is a tool that stores a gziped and encrypted version somewhere in the archive. In the archive there is a reserved space for storing header information regarding encrypted data. The header contains information such as the position and size of the encrypted data in the archive. Elettra enables plausible deniability: it allows you to add many files with different password in an archive. The user may input different password to decrypt corresponding file. TrueCrypt is open source program used to encrypt volumes on your computer, enabling only single hidden volume. The volume can be a file (a virtual disk) or a disk partition. It enables plausible deniability: allowing you to create a hidden volume inside a normal TrueCrypt volume’s free space. If the first 512 bytes are not decrypted by the given password, program will try the same operation on another location.FreeOTFE encrypt drive on windows system,similarly TrueCrypt, hidden volumes can be built inside the free space of a normal volume,enabling multiple hidden volumes. However,you must be specify the offset at which the hidden data is to be written. FreeOTFE enables plausible deniability: it enable multiple hidden volumes, you can mount a hidden volume by specifying corresponding the offset of hidden volume.

    In addition to data hidden technology based on volume, steganography method is also a hidden data technology (an inefficient method), is to encapsulate sensitive data inside a normal file. For example StegFs[15] filesystem based on steganography technology.

    FDE was added into android system since android 3.0 version. On android platform,FDE does not encrypt entire disk as desktop operating system but only encrypting a physical userdata partition. Therefore, it not really a full disk encryption. Until android 4.3 version, android’s FDE use Dm-crypt[16] offered by LINUX kernel to implement transparent encryption. Once encryption is enabled, data writing to disk are automatically encrypted and data reading from disk are transparent decrypted. The encryption key (128-bit, calling master key) is generated randomly and wrapped by the user password. Individual disk sectors are encrypted by master key using AES in the CBC [17] mode. Android used a so called ‘crypto footer’ structure [18] to store encryption parameters, the structure usually lie to last 16 KB at the end of the partition.The smartphone encryption is optional item by user, but FDE defaults to be enable since android 5.0 version.

    At present, as far as we know, both Mobiflage and MobiHydra are only two prototype systems that implement PDE on the mobile platforms. They enable PDE by customizing source code of android FDE, and MobiHydra makes up for some faults based on designs of Mobiflage. Both implement to protect sensitive data of user stored on the smartphone.

    III. THREAT MODEL AND ASSUMPTIONS

    3.1 Threat model

    We consider threats from two situations. One is that the adversary is able to capture device,but disable getting into system and access physical disk. For example, the robbers kidnapped hostages, they can take away the victim’s smartphone, but they cannot login system because there is no password, the adversary can force the user for password to access the device; another is the adversary is able to not only controlling device but also getting root permission to access each partition.

    3.2 Assumption

    1. MobiGemini must be embedded android source code stream, or customizing android ROM (e.g., CyanogenMod[19]) ensure many devices with PDE function and automatic uninstalling service. Therefore, an adversary will be unable to sure whether that device is capable of using PDE and automatic uninstalling service.

    2. We assume that APP (such as AliPay) installed in the device are often used in the standard mode, the adversary can coerce user to hand over encryption keys or passwords (e.g.,lockscreen password of the mobile device),owner of the smartphone is asked for trying my best to protect true password, or can pretend scare to provide chance of inputting false password.

    3. After user was coerced to hand over encryption key or password, The adversary is not keep to punish owner of the device before finding out indication of the hidden data in the case of rationality, and also indefinitely hold user.

    4. We assume the mobile ROM, kernel and BootLoader may be trusted. In the PDE mode,insecure APP will not be started to prevent leakage from the hidden data.

    5. We assume mobile device cannot be captured by the adversary under PDE mode, or else the privacy data will be retrieved from the device. Hence, we need user to comply with certain principle.

    IV. MOBIGEMINI DESIGN

    4.1 Overview

    We expatiate our design and explain reason we do in this section. Our design makes up for some deficiencies of other prototype system that enable PDE function for mobile platform.Our prototype system provides automatic uninstalling APP and PDE function. Automatic uninstalling APP was implemented as a system service of framework layer. We implement PDE function by hiding volume in a free area within the partition of flash disk. We first fill random data generated by pseudo random function [20] to mobile device storage, to conceal existence of hidden volume.

    We define following operating mode for MobiGemini. (1) The standard mode is used daily work to user. In this mode, owner of device can use full disk encryption and APP automatic uninstall service (additional customizing system service[21]) to protect data and sensitive resource. User may supply decoy password at the boot time to enter the standard mode, userdata partition is normally mounted at /sdcard directory (without PDE function).We use terms “decoy” and “normal” when we refer to password and volume. (2)The scene of using PDE mode is when user needs saving important privacy data (e.g., photos and video for forensics), it need to be denied existence in the case of emergency. User supplies their true password to enter the PDE mode at booting system, and system mount hidden volume to corresponding directory. We use terms “true”and “hidden” when referring to password,keys and volume in the PDE mode.

    4.2 Automatic uninstalling service design

    Android system provides all kinds of system services (e.g., Media, Surface) for applications at the application framework layer. Package-Manager service [22] implements installing/uninstalling application on the android system.User can pull icon of application to garbage located above of screen to uninstall application after screen locker is unlocked. In the above mentioned scenario, user cannot timely uninstall application following normal operating way in an emergency. For example, the adversary captures device of user to coerce her/him unlocking device, user does not have time to unload sensitive APP on the device. However,on the smartphone with the MobiGemini, user can inputs many time wrong password to trigger uninstalling service for uninstalling one or multiple APP.

    The module of automatic uninstall service is demonstrated as shown Fig.1. The module refers to both layers of the application and application framework. Including five parts, the three of them need customizing source code of android marked using light blue. Lockscreen APP implements locking screen after a period of time without any operation, and records times of password failure for triggering automatic uninstall system service. UI application provides a setting view, user can selects application that user wants to uninstall and then pass their package’s name to a configuration file of automatic uninstall service. The service will uninstall applications selected by reading its con figuration file when it is triggered.User can also modifies configuration file by UI application for uninstalling different applications. The service is registered as a system service that working in the framework layer,it has same life cycle as android operating system. The Sensitive APP refer to the application that operate sensitive data of user such as mobile Terminal of bank, AliPay, WeChat,QQ and so on. When user is coerced, these sensitive APP may aggravate punishment user suffers or leak account information of Social software.

    The adversary forces her/him to unlock lockscreen when owner of the device is coerced, in this case user pretends afraid to enter error password three times (presetting threshold value by user), this will trigger uninstalling service to read its configuration file that stores name of application that user selects by UI application, uninstalling service then pass name of application to PackageManager service to implement uninstalling the application specified. The adversary would not find any sensitive application after user enter correct lockscreen password. To a certain extent this alleviate that the adversary continues punishing owner of the device.

    4.3 PDE function design

    Android system implement FDE function by encrypting whole userdata partition. We implement PDE function by enabling hidden volume on mobile device based on FDE of android system. User may input true password to enter PDE mode at booting system. In this mode, user may stores sensitive data to hidden volume, meanwhile data are encrypted by Dm-crypt of Linux during writing to disk, the encryption process is transparent to user.

    Fig. 1 Automatic uninstall system service module

    Now, there are two ways of implementing PDE function: hidden volumes (e.g.,FreeOtfe) and Steganographic file systems(e.g., StegFs[15]). The latter has some known disadvantages including: inefficient storage space utilization, and a number of extra IO operations. These drawbacks are unacceptable on mobile platform, considering some reasons such as power limitation, and relatively limited storage space and so on. Therefore, we choose hidden volumes for MobiGemini. This hints IO is as efficient as FDE of android.

    4.3.1 The key storage way

    Android uses a so called ‘crypto footer’structure[17] to store encryption parameters(e.g., master key and initialization vector), the master key is generated randomly by system,and the structure is usually located in the last 16KB of userdata partition or other location according to different android system. True-Crypt that is known encryption software on desktop operating system enable PDE function by enabling one hidden volume, it stores master key at the beginning of the corresponding hidden volume. Mobiflage that is an original system enabling PDE in the android system references to key storage way of TrueCrypt to store its master key at the beginning of hidden volume. The merit of this storage way is easy obtaining key from disk, however, this way has a fatal flaws that the sector of storing key may be overwritten by other data, this may result in losing all sensitive data stored hidden volume.

    In our original system, we improve the key storage way of the other original system (e.g.,Mobiflage or MobiHydra) enabling PDE,considering resource limitation and especially power limitation, we don’t extend master key length of hidden volume. Speci fic master key storing way is demonstrated on figure 2.

    In the standard mode, user enters decoy password at the booting system, then passing it to PBKDF2[23] (a hash function) to iterate 2000 times for generating a key of AES-128,utilizing this key to decrypt the encrypted master key (randomly generating by android system) stored in the Crypt footer and finally obtaining Decoy master key for decrypting userdata partition. In the PDE mode, user enters true password and then passing it to same PBKDF2 function to iterate 2000 for generating another key of AES-128, decrypting the same encrypted master key (only one encrypted key and initial vector stored in the structure of Crypt footer) and eventually getting true master key for decrypting hidden volume. Here,decoy master key is generated randomly by system, while true master key is not generated randomly by system but generating true master key by decrypting encrypted key stored in Crypt footer structure. Specific principle as shown on figure 3.

    keyA is encrypted using decoy password to generate keyB. keyB is decrypted using true password to generate keyC, and vice versa.Here, keyA is equal to decoy master key, keyB is equal to encrypted key stored into Crypt footer structure, keyC is equal to true master key.

    Fig. 2 The key decrypting process

    Fig. 3 The generating key principle

    The way of generating true master key shows as above, this is inspired by deniable encryption. During network communication,deniable encryption[6] indicate that a ciphertext may be decrypted different plaintext depending on different key, thus, unable to prove the existence of a plaintext. This way avoids storing key to disk and prevents the opponent from finding key or destroying key,this increases the security of master key. From the perspective of theory analysis, their keys space is 2128, brute-force difficulty is almost same (1/2128≈1/2128). Consequently, this way of key generation does not reduce the difficulty of brute-force.

    4.3.2 Storage layout

    The android system has usually multiple partitions [24] (e. g., system partition, recovery partition), and each partition has respective purpose. For instance, android system files and system applications were stored in the system partition. Only cache partition and userdata partition among all partitions are implemented reading/writing operations by applications.Storage layout is as shown in figure 4:

    In our prototype system, we embed hidden volume in the cache partition. First, the cache partition is filled with random data before formatting such that there are no distinguishing characteristics between empty blocks and hidden volume. Previous PDE prototype systems that embed hidden volume in the userdata partition have a defect that may incur sensitive data of hidden volume to be corrupted across volume boundary during writing file to disk.However, our system alleviates the risk of across volume boundary. Because cache partition has the following features: first, the partition is only used as cache by system applications (e. g., google play), utilization of cache partition is usually no more than 3%; second,the partition is only used during update of system by OTA way, and user may control time of updating the system. In the PDE mode,mounting hidden volume at /sdcard directory for avoiding altering source code of applications.

    4.3.3 Offset calculation

    The offset of hidden volume is derived from the password provided by the user at the initiation of PDE function, it is generated as follows: Whereplenis the number of sector of cache partition, F is a PBKDF2 [23] hash function,pwdis the true password,saltis a random salt value for F, the salt value is also used for derivation of userdata partition key(i.e., stored in the crypt footer). Thus, we may avoid to store additional salt value, and limited offset around the middle of cache partition for balancing between cache and hidden partition.We also optimize the formula of generating offset, storing hash result ofH(pwd||salt)at boot android, we may use the result directly of hash for reducing time of computing offset of hidden partition.

    Alternatively, the offset of hidden volume may be set in the middle of disk (e.g., appearing at 40 percent). However, generating offset by formula as shown above may complicate dictionary attack. If the offset was known by the adversary, he/she can easily implement dictionary attack.

    V. IMPLEMENTATION AND PERFORMANCE EVALUATION

    5.1 Model implementation

    We focus on implementation of prototype system in this section. Test of MobiGemini was performed on a SAMSUNG Galaxy S4 device and source code of cm11 of Cyanogenmod(the world’s largest third-party compiler team).We add the additional code into source code of framework for implementing automatic uninstalling system service. To enable hidden volume, we customize android volume mounting daemon (vold) and make subtle change to the default kernel configuration. We also discuss current implementation limitations of prototype system.

    To implement uninstalling system service,we adopt a simple way for adding a system service to our prototype system, main involving three parts of AIDL (android interface describe language), JNI (java native interface)and HAL (hardware abstract layer). Here AIDL implements an interface for application layer, as bene fit from the AIDL tool’s capability to generate marshaling and unmarshaling code in java for callers and callees. JNI implements java calling C function for manipulation about the underlying data. HAL implements support to a speci fic hardware, instead, uninstalling service don’t have to real support a hardware, only implementing a system service by this way. The service calls PackageManager to implement uninstalling applications,we extend function of the system service by adding corresponding to code to framework.We also modify source code of lockscreen application, and enforcing to trigger uninstalling service by determining the number of input wrong password.

    We made three important modifications to the default android FDE encryption scheme that are necessary to protect deniability: (a) we replace CBC-AES by XTS-AES [25,26]; (b)in the PDE mode, enabling mounting hidden volume; (c) filling random data after wiping sensitive data. XTS-AES can defeat some known attack (e.g., copy-and-paste attack[27]). We still use 128 bit key as master key of hidden volume, due to resources limitation of mobile device.

    To set up hidden volume in the cache partition, first, we fill random data to the whole cache partition, we then use mke2fs tool(cm11 android system integrate a partition tool) to build a hidden volume at a specified offset, next, we format the volume for ext4 file system. Space size of hidden volume show size of from offset of hidden volume to end of cache partition, while cache presents original partition sizes still.

    Limitation: limitations about our prototype include:

    1. At present, owner of the device cannot set a very large size of hidden volume,because size of cache partition is relatively small comparing to userdata partition. Now cache partition of android system is usually 2G, Therefore, size of hidden volume is about 1G(around half of cache partition). we may extend size of cache partition and reduce size of userdata partition by modifying corresponding to source code of android, but we only increase space of cache partition limited, otherwise, the adversary can find out some different about layout of android storage.

    2. Users cannot change decoy password and true password after storing sensitive data into hidden volume. If users want to change one of decoy password or true password, data stored in hidden volume need to be copied to computer by USB cable or are discard directly.Users may change password arbitrarily when hidden volume is empty.

    3. Users need transmitting data between two modes in certain environment; such as taking a sensitive photo in the standard mode cannot be stored into hidden volume when there is no chance switching mode. In this case we don’t currently provide any safe protection. One solution that the sensitive photo is encrypted and stored into cache partition in the standard mode, decrypting and transferring photo to hidden volume from cache partition after switching to PDE mode.

    5.2 Performance evaluation

    We summarize our tests about prototype system, analyzing influence of the performance through customizing original system, and discussing time of booting system between FDE mode and PDE mode.

    We first utilize three APP for testing automatic uninstalling service, threshold of trigger is set three time. In order to evaluate the performance of the service, we input correct password of lock screen after inputting wrong password three times, finding no difference of systems between normal and enabling automatic uninstalling service, because Package-Manager service has already uninstalled three APP after inputting the fourth password(no matter right or wrong ).

    Cipher performance. To evaluate the encryption to impact of system performance,we read from and write to hidden volume on SAMSUNG device. We run 5 trails on five files between 64M and 800M using Andro-Bench[28], and using average as criterion of I/O throughput.

    We evaluate the performance of Mobi-Gemini scheme under the default android encryption. MobiGemini seems to be lower throughput by roughly 2 percent compared with the android FDE. As shown above Figure 5, the observed decrease in throughput of MobiGemini is due to the selected cipher:XTS-128. The required time to delete the data stored in the hidden volume is increased on account of the two pass random wipe. The exact time rely on type and size of flash storage.Table I summarizes functions and characters of system. The result shows FDE of android system does not enable data-hidden function and auto uninstalling APP function. The adversary can finds all privacy information of owner after login smartphone system. On the contrary, the others provide hidden volume to protect privacy data, and resist copy-to-paste attack. Although Mobiflage and MobiHydra have very high encryption strength, master key and hidden-data of hidden volume are not secure, being liable to overwritten by the file of normal volume. Because master key of hidden volume is stored at beginning address of corresponding hidden volume, there is a great possibility about cross-border pollution. By contrast, MobiGemini set hidden volume on /cache partition (using when OTA) to overcome cross-border pollution, master key of hidden volume is stored in the “crypto footer”, the way is more secure than stored at the beginning offset of hidden volume. Therefore, our prototype system can better protect sensitive data of owner of smartphone than other prototype systems and FDE, and power consumption is same as FDE (key length 128 bits). Further, MobiGemini can achieves protecting sensitive data under two threat model(above mentioned 3.1).

    System performance. We list booting time of entering standard mode and PDE mode of Mobiflage and MobiGemini respectively. As shown in Table II.

    The results show that MobiGemini consume much less time than Mobiflage during booting system, because Mobi flage always attempt to un-mount a persistent virtual volume when booting a system, and needing additional 2000 iterations of PBKDF2 hash function for computing offset of hidden volume.

    We optimize these processes by mounting hidden volume to /sdcard directory and directly obtaining hash value without additional2000 iterations. Initialization time of Mobi-Gemini is also much less than Mobi flage, this should be because they have the lesser key length and space size of hidden volume. In short, our prototype system is more suitable for mobile platform considering resource limitations.

    Table I System functions and robustness comparison

    Table II Performance comparison

    Fig. 5 Flash I/O throughput of performance

    VI. CONCLUDING REMARKS

    The powerful mobile devices are increasingly used for amusement and working, such as mobile payments and capturing image for forensics. To protect common users and owner of device or forensic workers, we propose MobiGemini to help them avoid the coercive attack. MobiGemini provides a secure frame to protect sensitive data and resources, allowing a user to uninstall quickly multiple sensitive APP at a time. In addition, we improve storage way of master key for enhancing security of key, we mitigate question of across boundary of volume when storing data into hidden volume. Certainly, MobiGemini also has some inherent defects (smaller size of hidden volume in flexible about change of user password), we need user to comply with some requirements.We present MobiGemini here to encourage researcher focus on mobile security.

    ACKNOWLEDGEMENTS

    The authors would like to thank the reviews for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was supported in part by Natural Science Foundation of China under (Grant No. U1536112);National Key Technology Research and Development Program of China (Grant No.2012BAH94F02); National High-tech R&D Program of China (863 Program) under Grant No. 2013AA102301; Project of New Generation Broad band Wireless Network under Grant No. 2014ZX03006003.

    [1] Statista. 2015 March, “Report of Global Market Share Held by Smartphone Operating Systems”. [Online]. Available: http://www.statista.com/statistics/263453/global-market-share-held-by-smartphone-operating-systems/.

    [2] Mobile payment, 2014 November, “Report of China’s Mobile Payment Users”. [Online].Available: http://www.iresearchchina.com/news/6025.html.

    [3] Derawi, Mohammad Omar, et al. “Unobtrusive user-authentication on mobile phones using biometric gait recognition”.Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP), 2010 Sixth International Conference on. IEEE, 2010.

    [4] Full Disk Encryption, 2014. “Android Encryption Technology, Online Document” [Online]. Available: http://source.android.com/devices/tech/security/encryption/.

    [5] Sahai, Amit, and Brent Waters. “How to use indistinguishability obfuscation: deniable encryption, and more.”Proceedings of the 46th Annual ACM Symposium on Theory of Computing. ACM,2014.

    [6] Canetti, Rein, et al. “Deniable encryption.”Annual International Cryptology Conference.Springer Berlin Heidelberg, 1997.

    [7] Czeskis, Alexei, et al. “Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling OS and Applications.”HotSec. 2008.

    [8] FreeOtfe. 2005. “FreeOtfe- Free Transparent Disk Encryption Software”. [Online]. Available:Project website: http://sourceforge.net/projects/freeotfe.mirror/.

    [9] Skillen, Adam, and Mohammad Mannan. “Mobi flage: Deniable Storage Encryptionfor Mobile Devices.”IEEE Transactions on Dependable and Secure Computing11.3 (2014): 224-237.

    [10] Yu, Xingjie, et al. “Mobihydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices.”International Conference on Information Security. Springer International Publishing, 2014.

    [11] Petitcolas, Fabien AP, Ross J. Anderson, and Markus G. Kuhn. “Information hiding-a survey.”Proceedings of the IEEE87.7 (1999): 1062-1078.

    [12] Windows Inc. 2015. BitLocker Driver Encryption,[Online]. Available: http:// windows.microsoft.com/en-us/windows7/products/features/bitlocker.

    [13] Fu, Kevin E.Group sharing and random access in cryptographic storage file systems. Diss. Massachusetts Institute of Technology, 1999.

    [14] Elettra —plausible deniable file cfyptography.2015. [Online]. Available: http://www.winstonsmith.info/julia/elettra/.

    [15] McDonald, Andrew D., and Markus G. Kuhn.“StegFS: A steganographic file system for Linux.”International Workshop on Information Hiding.Springer Berlin Heidelberg, 1999.

    [16] Fruhwirth, Clemens. “Hard disk encryption with DM-Crypt, LUKS, and cryptsetup.”ISSUE61(2005): 65-71.

    [17] Frankel, Sheila, Rob Glenn, and Scott Kelly.The AES-CBC cipher algorithm and its use with IPsec.No. RFC 3602. 2003.

    [18] Google Inc. 2014. dm-crypt: Linux kernel device-mapper crypto target. [Online]. Available:https://code.google.com/p/cryptsetup/wiki/DMCrypt.

    [19] Cyanomgenmod. 2015. Free customing android system. [Online]. Available: http://www.cyanogenmod.org/.

    [20] Wei, Michael Yung Chung, et al. “Reliably Erasing Data from Flash-Based Solid State Drives.”FAST. Vol. 11. 2011.

    [21] Yaghmour, Karim.Embedded Android: Porting,Extending, and Customizing. “O’Reilly Media,Inc.”, 2013.

    [22] Sharkey, Jeff. “Coding for life—battery life, that is.”Google IO Developer Conference. Vol. 2009.2009.

    [23] Kaliski, Burt. “PKCS# 5: Password-based cryptography speci fication version 2.0.” (2000).

    [24] Hoog, Andrew.Android forensics: investigation,analysis and mobile security for Google Android.Elsevier, 2011.

    [25] Rogaway, Phillip. “Nonce-based symmetric encryption.”Fast Software Encryption. Springer Berlin/Heidelberg, 2004.

    [26] Dworkin, Morris. “Recommendation for block cipher modes of operation: The XTS-AES mode for confidentiality on storage devices.”NIST Special Publication800 (2010).

    [27] Fruhwirth, Clemens.New methods in hard disk encryption. na, 2005.

    [28] AndroBench. 2015. Android File System Benchmark, version 4.1. [Online]. Available: http://www.androbench.org/wiki/AndroBench/, 2015.

    九九久久精品国产亚洲av麻豆| 99久久精品热视频| .国产精品久久| 人人妻人人看人人澡| 蜜桃久久精品国产亚洲av| 久久久国产成人免费| 日韩成人av中文字幕在线观看| 精品久久久久久久久亚洲| 12—13女人毛片做爰片一| 伦理电影大哥的女人| 在线播放无遮挡| 欧美极品一区二区三区四区| 亚洲五月天丁香| 不卡视频在线观看欧美| 日本黄色片子视频| 亚洲精品久久国产高清桃花| 精品久久国产蜜桃| 黄片无遮挡物在线观看| 欧美潮喷喷水| 一区福利在线观看| 国产亚洲精品久久久久久毛片| 内射极品少妇av片p| 国产av麻豆久久久久久久| 国产精品麻豆人妻色哟哟久久 | 久久精品国产鲁丝片午夜精品| av女优亚洲男人天堂| 观看美女的网站| 麻豆乱淫一区二区| 国产黄色小视频在线观看| 国产av不卡久久| 色吧在线观看| 久久婷婷人人爽人人干人人爱| 日韩一本色道免费dvd| 三级男女做爰猛烈吃奶摸视频| 尾随美女入室| 18+在线观看网站| 天堂影院成人在线观看| 亚洲精品456在线播放app| 可以在线观看的亚洲视频| 欧美xxxx黑人xx丫x性爽| 精品久久久久久久久av| eeuss影院久久| 久久热精品热| 亚洲电影在线观看av| 日本熟妇午夜| 18+在线观看网站| 国产在线男女| 波多野结衣巨乳人妻| 久久久精品大字幕| 国产 一区 欧美 日韩| 99热这里只有精品一区| 麻豆乱淫一区二区| 国产成人aa在线观看| 免费观看的影片在线观看| 午夜福利在线观看吧| 日本免费a在线| 欧美日韩乱码在线| 青春草亚洲视频在线观看| 欧美精品国产亚洲| 国产精品免费一区二区三区在线| 久久国产乱子免费精品| 人人妻人人澡欧美一区二区| 日韩欧美 国产精品| 三级国产精品欧美在线观看| 欧美最新免费一区二区三区| 成年版毛片免费区| 欧美日韩国产亚洲二区| 天堂av国产一区二区熟女人妻| 真实男女啪啪啪动态图| 日本三级黄在线观看| 亚洲av不卡在线观看| 欧美另类亚洲清纯唯美| 国产91av在线免费观看| 麻豆av噜噜一区二区三区| 午夜激情欧美在线| 蜜桃亚洲精品一区二区三区| 国产单亲对白刺激| 亚洲一区高清亚洲精品| 男人狂女人下面高潮的视频| 色视频www国产| 最近的中文字幕免费完整| 日韩 亚洲 欧美在线| 国产黄色视频一区二区在线观看 | 国产视频首页在线观看| 97在线视频观看| 国产一区二区亚洲精品在线观看| 国产一区二区亚洲精品在线观看| 国产成人福利小说| 国产精品三级大全| 精品久久久久久久久av| 又粗又硬又长又爽又黄的视频 | 校园人妻丝袜中文字幕| 少妇裸体淫交视频免费看高清| av在线天堂中文字幕| 色播亚洲综合网| 欧美xxxx黑人xx丫x性爽| 听说在线观看完整版免费高清| 国产一区二区在线av高清观看| 国产一区二区三区在线臀色熟女| 美女高潮的动态| 精品人妻熟女av久视频| 国产精品久久久久久精品电影小说 | 一本一本综合久久| 午夜免费激情av| 18禁裸乳无遮挡免费网站照片| 久久久久九九精品影院| 高清毛片免费观看视频网站| 一本久久中文字幕| 久久九九热精品免费| 国产成人aa在线观看| 欧美色欧美亚洲另类二区| a级毛色黄片| 人妻久久中文字幕网| 直男gayav资源| 国产大屁股一区二区在线视频| 一本精品99久久精品77| 国产 一区 欧美 日韩| 国产精品电影一区二区三区| 久久这里有精品视频免费| 久久久久免费精品人妻一区二区| 免费av观看视频| 中国美白少妇内射xxxbb| 国产精品电影一区二区三区| 免费观看精品视频网站| 中文字幕av在线有码专区| 麻豆一二三区av精品| 亚洲人成网站在线观看播放| 日韩欧美在线乱码| 国产伦在线观看视频一区| 白带黄色成豆腐渣| 亚洲人成网站在线播放欧美日韩| 国产精品一区二区在线观看99 | 亚洲精品日韩在线中文字幕 | 乱系列少妇在线播放| 国产成人aa在线观看| 欧美成人精品欧美一级黄| 日本在线视频免费播放| 看黄色毛片网站| 特级一级黄色大片| 国产精品1区2区在线观看.| 在线a可以看的网站| 在线天堂最新版资源| 国产乱人视频| 精品人妻视频免费看| av国产免费在线观看| www日本黄色视频网| 日日撸夜夜添| 哪里可以看免费的av片| 在线观看美女被高潮喷水网站| 性插视频无遮挡在线免费观看| 一区二区三区免费毛片| 国产淫片久久久久久久久| 99热这里只有是精品在线观看| 亚洲国产精品国产精品| 久久这里有精品视频免费| 日韩国内少妇激情av| 熟女电影av网| 男女啪啪激烈高潮av片| 精品久久久久久久久亚洲| 免费电影在线观看免费观看| 国产国拍精品亚洲av在线观看| 噜噜噜噜噜久久久久久91| 免费搜索国产男女视频| 久久午夜亚洲精品久久| 午夜爱爱视频在线播放| 夜夜夜夜夜久久久久| 国产精品永久免费网站| 国产欧美日韩精品一区二区| 国产伦一二天堂av在线观看| 女同久久另类99精品国产91| 日韩av不卡免费在线播放| 精品人妻视频免费看| 国产精品免费一区二区三区在线| 日韩强制内射视频| 毛片一级片免费看久久久久| 亚洲最大成人手机在线| 日本黄色片子视频| 国产单亲对白刺激| 春色校园在线视频观看| eeuss影院久久| 久久这里有精品视频免费| 欧美激情在线99| 一级黄色大片毛片| 欧美日韩国产亚洲二区| 在线播放无遮挡| 天天一区二区日本电影三级| 日本成人三级电影网站| 成人毛片a级毛片在线播放| 日产精品乱码卡一卡2卡三| 国语自产精品视频在线第100页| 黄色配什么色好看| 国产在线男女| 免费观看在线日韩| 久久99蜜桃精品久久| 国产午夜精品久久久久久一区二区三区| 欧美bdsm另类| 国产成人精品婷婷| 少妇丰满av| www.色视频.com| 色哟哟·www| 午夜亚洲福利在线播放| 69av精品久久久久久| 毛片一级片免费看久久久久| 久久久久网色| 一进一出抽搐动态| 国产麻豆成人av免费视频| 中文字幕免费在线视频6| 亚洲欧美日韩高清在线视频| 可以在线观看毛片的网站| 波多野结衣巨乳人妻| 尾随美女入室| 国产伦一二天堂av在线观看| 国产亚洲精品av在线| 国产精品一区二区三区四区免费观看| 插逼视频在线观看| 亚洲精品日韩在线中文字幕 | 国产精品女同一区二区软件| 亚洲av第一区精品v没综合| 观看美女的网站| 国产精品久久久久久av不卡| 国产亚洲av嫩草精品影院| 久久精品久久久久久久性| 中文字幕免费在线视频6| 国产色爽女视频免费观看| kizo精华| 国产精品一区二区在线观看99 | 久久人妻av系列| 天堂网av新在线| 久久久久免费精品人妻一区二区| 成人高潮视频无遮挡免费网站| 身体一侧抽搐| 亚洲真实伦在线观看| 免费av毛片视频| 国产一区二区在线av高清观看| 观看美女的网站| 亚洲精品国产av成人精品| 国产视频内射| 欧美极品一区二区三区四区| 成人美女网站在线观看视频| 免费人成在线观看视频色| 欧美激情国产日韩精品一区| 欧美日韩一区二区视频在线观看视频在线 | 亚洲人成网站在线观看播放| 熟妇人妻久久中文字幕3abv| 久久精品91蜜桃| 国产亚洲5aaaaa淫片| www.色视频.com| 久久久久久大精品| 女人十人毛片免费观看3o分钟| 日韩高清综合在线| 久久精品夜色国产| 级片在线观看| 日韩成人伦理影院| 婷婷精品国产亚洲av| ponron亚洲| 欧美日韩精品成人综合77777| 久久久久久久久久黄片| 亚洲七黄色美女视频| 一本一本综合久久| 久久久久久久久久久丰满| 一个人看视频在线观看www免费| 久久久久久九九精品二区国产| 免费不卡的大黄色大毛片视频在线观看 | 成人无遮挡网站| 性欧美人与动物交配| 99精品在免费线老司机午夜| 国产亚洲精品久久久久久毛片| 午夜a级毛片| 青青草视频在线视频观看| 精品无人区乱码1区二区| 成人美女网站在线观看视频| 国产精品久久久久久久电影| 国产伦精品一区二区三区视频9| 欧美性猛交╳xxx乱大交人| 亚洲av免费高清在线观看| 精品久久久久久久久久久久久| 国内精品一区二区在线观看| 亚洲乱码一区二区免费版| 成人特级av手机在线观看| 亚洲四区av| 男女那种视频在线观看| 精品不卡国产一区二区三区| 久久精品国产自在天天线| 中国国产av一级| 精品一区二区三区视频在线| 久久久久久久亚洲中文字幕| 国产高清不卡午夜福利| 午夜a级毛片| 两个人视频免费观看高清| 麻豆精品久久久久久蜜桃| 中国美白少妇内射xxxbb| 亚洲精品乱码久久久久久按摩| АⅤ资源中文在线天堂| 国产精品嫩草影院av在线观看| 国产综合懂色| 婷婷精品国产亚洲av| 日韩欧美一区二区三区在线观看| 69av精品久久久久久| 国产又黄又爽又无遮挡在线| 看十八女毛片水多多多| 村上凉子中文字幕在线| 乱人视频在线观看| 国产精品美女特级片免费视频播放器| 老师上课跳d突然被开到最大视频| 久久久久久久久久黄片| 少妇猛男粗大的猛烈进出视频 | 1024手机看黄色片| 成人亚洲精品av一区二区| 欧美日韩国产亚洲二区| 91午夜精品亚洲一区二区三区| 日日撸夜夜添| 99国产精品一区二区蜜桃av| 男人狂女人下面高潮的视频| 色5月婷婷丁香| 国产女主播在线喷水免费视频网站 | a级毛片a级免费在线| 国产成人影院久久av| 又爽又黄a免费视频| 色5月婷婷丁香| 亚洲精品自拍成人| 国产黄a三级三级三级人| 午夜精品在线福利| 精品久久久久久久久久久久久| 亚洲在久久综合| 亚洲成人精品中文字幕电影| 成人特级av手机在线观看| 日韩高清综合在线| 国产精品蜜桃在线观看 | 在线观看免费视频日本深夜| 日韩中字成人| 日韩成人av中文字幕在线观看| 少妇人妻精品综合一区二区 | 国产高清不卡午夜福利| www日本黄色视频网| 91在线精品国自产拍蜜月| 中出人妻视频一区二区| 午夜免费男女啪啪视频观看| 国产精品综合久久久久久久免费| 精品午夜福利在线看| 麻豆成人午夜福利视频| 可以在线观看毛片的网站| av天堂在线播放| 日韩强制内射视频| 国产单亲对白刺激| 99久久九九国产精品国产免费| 亚洲美女视频黄频| 午夜免费激情av| 可以在线观看毛片的网站| 波多野结衣高清无吗| 超碰av人人做人人爽久久| 极品教师在线视频| 变态另类成人亚洲欧美熟女| 免费电影在线观看免费观看| 好男人在线观看高清免费视频| 成人午夜精彩视频在线观看| 国产爱豆传媒在线观看| 国产精品精品国产色婷婷| 欧美极品一区二区三区四区| 精品不卡国产一区二区三区| 中文精品一卡2卡3卡4更新| 久久人人爽人人片av| 国产毛片a区久久久久| 免费av毛片视频| 老司机影院成人| kizo精华| 国产精品福利在线免费观看| 舔av片在线| 一本久久中文字幕| 99久久成人亚洲精品观看| 两性午夜刺激爽爽歪歪视频在线观看| av在线蜜桃| av在线天堂中文字幕| 内地一区二区视频在线| 国产一级毛片七仙女欲春2| 男女边吃奶边做爰视频| 桃色一区二区三区在线观看| 少妇熟女aⅴ在线视频| 菩萨蛮人人尽说江南好唐韦庄 | www.色视频.com| 给我免费播放毛片高清在线观看| 天堂av国产一区二区熟女人妻| 深夜a级毛片| 亚洲婷婷狠狠爱综合网| 久久久精品大字幕| 欧美日本亚洲视频在线播放| 欧美激情在线99| 大又大粗又爽又黄少妇毛片口| 久久久午夜欧美精品| 嫩草影院入口| 免费人成在线观看视频色| 久久99蜜桃精品久久| 亚洲婷婷狠狠爱综合网| 欧美潮喷喷水| 欧美日韩在线观看h| 最近手机中文字幕大全| 伦精品一区二区三区| 深夜精品福利| 青春草国产在线视频 | 亚洲不卡免费看| 欧美日韩一区二区视频在线观看视频在线 | 亚洲国产精品国产精品| 12—13女人毛片做爰片一| 99九九线精品视频在线观看视频| 午夜精品国产一区二区电影 | 日韩视频在线欧美| 日韩一本色道免费dvd| 一个人免费在线观看电影| 国产久久久一区二区三区| 亚洲成人久久性| 国产黄色小视频在线观看| 久久精品国产鲁丝片午夜精品| 国产一级毛片七仙女欲春2| or卡值多少钱| 在线播放国产精品三级| 在线观看av片永久免费下载| 日韩成人av中文字幕在线观看| 蜜桃久久精品国产亚洲av| 寂寞人妻少妇视频99o| 男女边吃奶边做爰视频| 日韩欧美国产在线观看| 久久精品91蜜桃| 亚洲精品粉嫩美女一区| 人妻久久中文字幕网| 亚洲人成网站高清观看| 国产精品久久久久久亚洲av鲁大| 亚洲欧美日韩卡通动漫| 欧美一级a爱片免费观看看| 日本五十路高清| 免费搜索国产男女视频| 啦啦啦韩国在线观看视频| 精品人妻视频免费看| 禁无遮挡网站| 麻豆成人av视频| 亚洲精品色激情综合| 女人被狂操c到高潮| 不卡一级毛片| 18禁在线播放成人免费| 久久久久久久久久久丰满| 欧美一区二区精品小视频在线| 国产黄色小视频在线观看| 尤物成人国产欧美一区二区三区| 五月玫瑰六月丁香| 亚洲欧美日韩卡通动漫| 亚洲在线观看片| 国产午夜精品久久久久久一区二区三区| 成人无遮挡网站| 91精品一卡2卡3卡4卡| 国产精品av视频在线免费观看| 国产美女午夜福利| 国产白丝娇喘喷水9色精品| 久久精品影院6| 极品教师在线视频| 我的老师免费观看完整版| 国产精品精品国产色婷婷| 国产成人a区在线观看| 精品人妻视频免费看| 亚洲精品国产av成人精品| 欧美日韩国产亚洲二区| 国产蜜桃级精品一区二区三区| 欧美xxxx性猛交bbbb| www.av在线官网国产| 国产一区二区激情短视频| 亚洲国产精品久久男人天堂| 久久欧美精品欧美久久欧美| 性插视频无遮挡在线免费观看| 联通29元200g的流量卡| 久久人人精品亚洲av| 午夜精品在线福利| 国产伦一二天堂av在线观看| 日韩三级伦理在线观看| 国产精品蜜桃在线观看 | 色综合亚洲欧美另类图片| 国产麻豆成人av免费视频| 国产精品1区2区在线观看.| 欧美性猛交黑人性爽| 国产 一区 欧美 日韩| 国产一区二区三区av在线 | 亚洲欧美精品自产自拍| 亚洲欧美日韩卡通动漫| 国产欧美日韩精品一区二区| 一区福利在线观看| 三级毛片av免费| 国产毛片a区久久久久| 国产成人福利小说| 日韩欧美国产在线观看| 国产乱人视频| 99久久精品国产国产毛片| 国产伦一二天堂av在线观看| 亚洲精品粉嫩美女一区| 亚洲图色成人| 欧美日本亚洲视频在线播放| 99久国产av精品国产电影| 欧美不卡视频在线免费观看| 深爱激情五月婷婷| 亚洲在线自拍视频| 99久久精品热视频| 校园春色视频在线观看| 黄片无遮挡物在线观看| 狂野欧美白嫩少妇大欣赏| 日本黄色视频三级网站网址| 久久韩国三级中文字幕| 欧美激情国产日韩精品一区| 我要看日韩黄色一级片| 国产精品电影一区二区三区| 高清日韩中文字幕在线| 老司机福利观看| 日产精品乱码卡一卡2卡三| 精品一区二区三区视频在线| 国产老妇女一区| 亚洲aⅴ乱码一区二区在线播放| 欧美日本视频| 精品久久久久久久久av| 国产色爽女视频免费观看| 菩萨蛮人人尽说江南好唐韦庄 | 亚洲av一区综合| 波多野结衣巨乳人妻| 少妇的逼好多水| 久久久a久久爽久久v久久| 日韩中字成人| 麻豆av噜噜一区二区三区| 神马国产精品三级电影在线观看| 国产片特级美女逼逼视频| 欧美日韩一区二区视频在线观看视频在线 | 亚洲国产精品合色在线| 免费大片18禁| 亚洲精华国产精华液的使用体验 | 精品久久久久久久久久久久久| 免费观看a级毛片全部| 午夜激情福利司机影院| 久久久久久九九精品二区国产| 毛片女人毛片| 夜夜看夜夜爽夜夜摸| 18禁在线无遮挡免费观看视频| 国产成人freesex在线| 观看美女的网站| 国产免费男女视频| 在线观看美女被高潮喷水网站| 久久久久免费精品人妻一区二区| 九九热线精品视视频播放| 国产激情偷乱视频一区二区| 久久精品影院6| 日韩视频在线欧美| 五月玫瑰六月丁香| 十八禁国产超污无遮挡网站| 99久久中文字幕三级久久日本| av黄色大香蕉| 国产精品免费一区二区三区在线| 精品久久久久久久久久久久久| www.色视频.com| 日本在线视频免费播放| 丰满的人妻完整版| 亚洲美女搞黄在线观看| 色噜噜av男人的天堂激情| 午夜精品国产一区二区电影 | 国产精品一区二区性色av| 男人和女人高潮做爰伦理| 国产极品精品免费视频能看的| 国产精华一区二区三区| 人体艺术视频欧美日本| 一夜夜www| 久久亚洲国产成人精品v| 久久久精品欧美日韩精品| 丝袜喷水一区| 亚洲成人精品中文字幕电影| 亚洲五月天丁香| 在线国产一区二区在线| 91麻豆精品激情在线观看国产| 免费在线观看成人毛片| 大又大粗又爽又黄少妇毛片口| 亚洲电影在线观看av| 欧美一区二区亚洲| 99热这里只有是精品50| 亚洲欧美精品专区久久| 乱系列少妇在线播放| 国产成人精品久久久久久| 亚洲婷婷狠狠爱综合网| 国内精品一区二区在线观看| 亚洲aⅴ乱码一区二区在线播放| 久久久久久久久久久免费av| 欧美在线一区亚洲| 一个人看的www免费观看视频| 91久久精品国产一区二区成人| 在线播放无遮挡| av在线天堂中文字幕| 亚洲最大成人中文| 搡老妇女老女人老熟妇| 国产精品.久久久| 18禁在线无遮挡免费观看视频| 一级黄色大片毛片| 禁无遮挡网站| 91久久精品电影网| 中文字幕精品亚洲无线码一区| 日韩av不卡免费在线播放| 99热全是精品| 成人三级黄色视频| 国产精品久久电影中文字幕| 亚洲av男天堂| 联通29元200g的流量卡| 综合色av麻豆| 久久亚洲国产成人精品v| 青春草亚洲视频在线观看| 国产亚洲精品av在线| 精品免费久久久久久久清纯| 人妻制服诱惑在线中文字幕| 女人十人毛片免费观看3o分钟| h日本视频在线播放| 春色校园在线视频观看| 国产高潮美女av| 日韩一区二区三区影片| 国产 一区精品| 别揉我奶头 嗯啊视频| 国产精品免费一区二区三区在线| 精品久久久久久久久久免费视频| 亚洲欧洲日产国产| 欧美人与善性xxx|