IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware
暂无分享,去创建一个
[1] Latifur Khan,et al. SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps , 2014, NDSS.
[2] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[3] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[4] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[5] David Brumley,et al. Enhancing symbolic execution with veritesting , 2014, ICSE.
[6] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[7] Anna Philippou,et al. Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.
[8] Hongseok Yang,et al. Automated concolic testing of smartphone apps , 2012, SIGSOFT FSE.
[9] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[10] Jeremy Clark,et al. Understanding and improving app installation security mechanisms through empirical analysis of android , 2012, SPSM '12.
[11] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[12] George Danezis,et al. Proceedings of the 2012 ACM conference on Computer and communications security , 2012, CCS 2012.
[13] Nikolai Tillmann,et al. DyTa: dynamic symbolic execution guided with static verification results , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[14] Stephen McCamant,et al. Input generation via decomposition and re-stitching: finding bugs in Malware , 2010, CCS '10.
[15] Michael D. Ernst. Static and dynamic analysis: synergy and duality , 2003 .
[16] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[17] Guofei Gu,et al. SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications , 2012, SPSM '12.
[18] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Hui Ye,et al. DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag , 2013, MoMM '13.
[20] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[21] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[22] Xue Liu,et al. Effective Real-Time Android Application Auditing , 2015, 2015 IEEE Symposium on Security and Privacy.
[23] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[24] Somesh Jha,et al. Retargeting Android applications to Java bytecode , 2012, SIGSOFT FSE.
[25] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[26] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[27] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[28] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[29] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[30] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[31] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[32] Suman Nath,et al. Brahmastra: Driving Apps to Test the Security of Third-Party Components , 2014, USENIX Security Symposium.
[33] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[34] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[35] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[36] Alexander Aiken,et al. Saturn: A scalable framework for error detection using Boolean satisfiability , 2007, TOPL.
[37] Yajin Zhou,et al. Detecting Passive Content Leaks and Pollution in Android Applications , 2013, NDSS.
[38] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[39] David Brumley,et al. AEG: Automatic Exploit Generation , 2011, NDSS.
[40] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[41] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[42] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[43] K. Yi,et al. Static Analyzer for Detecting Privacy Leaks in Android Applications , 2012 .