Android Malware Detection Based on System Calls
暂无分享,去创建一个
[1] A. N. Tikhonov,et al. Solutions of ill-posed problems , 1977 .
[2] R. Tibshirani. Regression Shrinkage and Selection via the Lasso , 1996 .
[3] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[4] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[5] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[6] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[7] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[8] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[9] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[10] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[11] Gemma C. Garriga,et al. Permutation Tests for Studying Classifier Performance , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[12] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[13] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[14] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[15] Somesh Jha,et al. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors , 2010, 2010 IEEE Symposium on Security and Privacy.
[16] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.
[17] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[18] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[19] Dawn Xiaodong Song,et al. TaintEraser: protecting sensitive data leaks using application-level taint tracking , 2011, OPSR.
[20] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[21] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[22] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[23] Steve Hanna,et al. Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications , 2012, DIMVA.
[24] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[25] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[26] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[27] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[28] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[29] Gianluca Dini,et al. MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.
[30] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[31] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[32] Swarat Chaudhuri,et al. Extraction of statistically significant malware behaviors , 2013, ACSAC.
[33] Konrad Rieck,et al. Structural detection of android malware using embedded call graphs , 2013, AISec.
[34] Daniela M. Witten,et al. An Introduction to Statistical Learning: with Applications in R , 2013 .
[35] Matthew Might,et al. Sound and precise malware analysis for android via pushdown reachability and entry-point saturation , 2013, SPSM '13.
[36] Max Kuhn,et al. Applied Predictive Modeling , 2013 .
[37] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[38] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[39] Mark Stamp,et al. Singular value decomposition and metamorphic detection , 2015, Journal of Computer Virology and Hacking Techniques.
[40] Ziming Zhao,et al. Morpheus: automatically generating heuristics to detect Android emulators , 2014, ACSAC '14.
[41] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[42] Isil Dillig,et al. Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.
[43] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[44] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[45] Matthew Might,et al. Fast Flow Analysis with Godel Hashes , 2014, 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation.
[46] Mark Stamp,et al. Support vector machines and malware detection , 2016, Journal of Computer Virology and Hacking Techniques.
[47] Tao Xie,et al. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.