DAMBA: Detecting Android Malware by ORGB Analysis
暂无分享,去创建一个
Hui He | Weizhe Zhang | Peng Liu | Huanran Wang | Peng Liu | Weizhe Zhang | Hui He | Huanran Wang
[1] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[2] Hui He,et al. PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform , 2014, Int. J. Distributed Sens. Networks.
[3] Jacques Klein,et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[4] Ming Fan,et al. DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis , 2017, IEEE Transactions on Information Forensics and Security.
[5] Ke Xu,et al. ICCDetector: ICC-Based Malware Detection on Android , 2016, IEEE Transactions on Information Forensics and Security.
[6] Thomas Schreck,et al. Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.
[7] John C. S. Lui,et al. DroidEagle: seamless detection of visually similar Android apps , 2015, WISEC.
[8] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[9] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[10] Julian R. Ullmann,et al. An Algorithm for Subgraph Isomorphism , 1976, J. ACM.
[11] Siu-Ming Yiu,et al. Dynamic Software Birthmark for Java Based on Heap Memory Analysis , 2011, Communications and Multimedia Security.
[12] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[13] Brendan D. McKay,et al. Practical graph isomorphism, II , 2013, J. Symb. Comput..
[14] P. Foggia,et al. Performance evaluation of the VF graph matching algorithm , 1999, Proceedings 10th International Conference on Image Analysis and Processing.
[15] Christian S. Collberg,et al. Detecting Software Theft via Whole Program Path Birthmarks , 2004, ISC.
[16] Christian Platzer,et al. MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[17] Padraig Cunningham,et al. Identifying Over-represented Temporal Processes in Complex Networks , 2014, DyNaK.
[18] Peng Liu,et al. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets , 2014, ICSE.
[19] Chao Yang,et al. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications , 2014, ESORICS.
[20] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[21] Naixue Xiong,et al. Android platform-based individual privacy information protection system , 2016, Personal and Ubiquitous Computing.
[22] Hui He,et al. Demadroid: Object Reference Graph-Based Malware Detection in Android , 2018, Secur. Commun. Networks.
[23] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[24] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[25] J. Köbler,et al. The Graph Isomorphism Problem: Its Structural Complexity , 1993 .
[26] Peng Wang,et al. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale , 2015, USENIX Security Symposium.
[27] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[28] Mario Vento,et al. A Performance Comparison of Five Algorithms for Graph Isomorphism , 2001 .
[29] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[30] Andrew K. C. Wong,et al. Graph Optimal Monomorphism Algorithms , 1980, IEEE Transactions on Systems, Man, and Cybernetics.
[31] Xuxian Jiang,et al. AppInk: watermarking android apps for repackaging deterrence , 2013, ASIA CCS '13.
[32] Frank Piessens,et al. Communications and Multimedia Security , 2014, Lecture Notes in Computer Science.
[33] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[34] Mario Vento,et al. An Improved Algorithm for Matching Large Graphs , 2001 .
[35] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[36] Vrizlynn L. L. Thing,et al. Securing Android , 2015, ACM Comput. Surv..
[37] Gianluca Stringhini,et al. MaMaDroid , 2019, ACM Trans. Priv. Secur..
[38] Gianluca Stringhini,et al. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version) , 2016, NDSS 2017.