Detecting Colluding Inter-App Communication in Mobile Environment
暂无分享,去创建一个
Antonella Santone | Francesco Mercaldo | Fabio Martinelli | Rosangela Casolare | F. Martinelli | A. Santone | F. Mercaldo | Rosangela Casolare
[1] Abdullahi Arabo,et al. Detecting Ransomware Using Process Behavior Analysis , 2020 .
[2] Aniello Cimitile,et al. Evaluating model checking for cyber threats code obfuscation identification , 2018, J. Parallel Distributed Comput..
[3] Mordechai Guri,et al. MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields , 2018, Future Gener. Comput. Syst..
[4] Eric Medvet,et al. Visualizing the outcome of dynamic analysis of Android malware with VizMal , 2020, J. Inf. Secur. Appl..
[5] Manoj Singh Gaur,et al. EspyDroid+: Precise reflection analysis of android apps , 2020, Comput. Secur..
[6] Donghai Tian,et al. MSYM: A multichannel communication system for android devices , 2020, Comput. Networks.
[7] Rosdiadee Nordin,et al. A New Sensors-Based Covert Channel on Android , 2014, TheScientificWorldJournal.
[8] Hamid Sharif,et al. A Support Vector Machine-Based Framework for Detection of Covert Timing Channels , 2016, IEEE Transactions on Dependable and Secure Computing.
[9] Antonella Santone,et al. Model checking for malicious family detection and phylogenetic analysis in mobile environment , 2020, Comput. Secur..
[10] Atif M. Memon,et al. Colluding Apps: Tomorrow's Mobile Malware Threat , 2015, IEEE Security & Privacy.
[11] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[12] Gerardo Canfora,et al. LEILA: Formal Tool for Identifying Mobile Malicious Behaviour , 2019, IEEE Transactions on Software Engineering.
[13] Ke Xu,et al. ICCDetector: ICC-Based Malware Detection on Android , 2016, IEEE Transactions on Information Forensics and Security.
[14] Antonella Santone,et al. Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences , 2020, Inf..
[15] Aniello Cimitile,et al. Talos: no more ransomware victims with formal methods , 2018, International Journal of Information Security.
[16] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[17] Cheng Huang,et al. Covert timing channel detection method based on time interval and payload length analysis , 2020, Comput. Secur..
[18] Sanaa Ghouzali,et al. Android data storage security: A review , 2020, J. King Saud Univ. Comput. Inf. Sci..
[19] Antonella Santone,et al. Heuristic search for equivalence checking , 2014, Software & Systems Modeling.
[20] Thomas M. Chen,et al. Automated generation of colluding apps for experimental research , 2017, Journal of Computer Virology and Hacking Techniques.