Permission-combination-based scheme for Android mobile malware detection
暂无分享,去创建一个
[1] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[2] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[3] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[4] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[5] Ayumu Kubota,et al. Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[6] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[7] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[8] Angelos Stavrou,et al. Analysis of Android Applications' Permissions , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability Companion.
[9] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[10] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[11] Dong Xuan,et al. D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources , 2013, 2013 Proceedings IEEE INFOCOM.