Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
暂无分享,去创建一个
Xiangliang Zhang | Xing Wang | Jiqiang Liu | Wei Wang | Zhen Han | Dawei Feng | Xiangliang Zhang | Jiqiang Liu | Wei Wang | Xing Wang | Zhen Han | Dawei Feng
[1] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[2] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[3] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[4] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[5] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[6] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[7] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[8] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[9] Ron Kohavi,et al. Wrappers for Feature Subset Selection , 1997, Artif. Intell..
[10] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[11] Ninghui Li,et al. Android permissions: a perspective combining risks and benefits , 2012, SACMAT '12.
[12] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[13] Dawn Xiaodong Song,et al. Contextual Policy Enforcement in Android Applications with Permission Event Graphs , 2013, NDSS.
[14] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[15] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[16] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[17] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[18] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[19] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[20] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[21] Zhuoqing Morley Mao,et al. AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users , 2013, CODASPY.
[22] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[23] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[24] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[25] Xingquan Zhu,et al. Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.
[26] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.
[27] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[28] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY '13.
[29] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[30] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.