Stealth attacks: An extended insight into the obfuscation effects on Android malware
暂无分享,去创建一个
Giorgio Giacinto | Davide Ariu | Igino Corona | Davide Maiorca | Marco Aresu | I. Corona | Davide Maiorca | G. Giacinto | Davide Ariu | M. Aresu | Igino Corona
[1] John C. S. Lui,et al. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems , 2012, DIMVA.
[2] Yajin Zhou,et al. Android Malware , 2013, SpringerBriefs in Computer Science.
[3] Dan Arp,et al. Drebin : � Efficient and Explainable Detection of Android Malware in Your Pocket , 2014 .
[4] Xuxian Jiang,et al. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks , 2014, IEEE Transactions on Information Forensics and Security.
[5] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[6] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Godfrey Nolan. Decompiling Android , 2012, Apress.
[8] Andrea Valdi,et al. AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors , 2013, SPSM '13.
[9] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[10] Sencun Zhu,et al. A Framework for Evaluating Mobile App Repackaging Detection Algorithms , 2013, TRUST.
[11] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[12] Sotiris Ioannidis,et al. Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.
[13] Tilo Müller,et al. PANDORA applies non-deterministic obfuscation randomly to Android , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).