I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware
暂无分享,去创建一个
Fabio Martinelli | Andrea Saracino | Corrado Aaron Visaggio | Francesco Mercaldo | F. Martinelli | A. Saracino | C. A. Visaggio | F. Mercaldo
[1] Sakir Sezer,et al. A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[2] Eric Medvet,et al. Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[3] Leyla Bilge,et al. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Gerardo Canfora,et al. A Classifier of Malicious Android Applications , 2013, 2013 International Conference on Availability, Reliability and Security.
[5] Eric Medvet,et al. Detecting Android malware using sequences of system calls , 2015, DeMobile@SIGSOFT FSE.
[6] Zhong Chen,et al. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.
[7] Gerardo Canfora,et al. Mobile malware detection using op-code frequency histograms , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).
[8] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[9] Ram Dantu,et al. Another free app: Does it have the right intentions? , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[10] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[11] R. Ramachandran,et al. Android Anti-Virus Analysis , .
[12] Gianluca Dini,et al. MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention , 2018, IEEE Transactions on Dependable and Secure Computing.
[13] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[14] Xuxian Jiang,et al. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks , 2014, IEEE Transactions on Information Forensics and Security.
[15] Xiaojiang Du,et al. Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).
[16] Dan Arp,et al. Drebin : � Efficient and Explainable Detection of Android Malware in Your Pocket , 2014 .
[17] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[18] Gianluca Dini,et al. Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[19] Jiqiang Liu,et al. A Two-Layered Permission-Based Android Malware Detection Scheme , 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[20] Jules Desharnais,et al. Static Detection of Malicious Code in Executable Programs , 2000 .
[21] Jean-Marc Robert,et al. Smartphone malware detection: From a survey towards taxonomy , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[22] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[23] Ayumu Kubota,et al. Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[24] Mi-Jung Choi,et al. Analysis of Android malware detection performance using machine learning classifiers , 2013, 2013 International Conference on ICT Convergence (ICTC).
[25] Gerardo Canfora,et al. Composition-Malware: Building Android Malware at Run Time , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[26] Thomas Schreck,et al. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques , 2015, International Journal of Information Security.
[27] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[28] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.