Automated identification of installed malicious Android applications
暂无分享,去创建一个
Andrew Hunt | Mark Guido | Jared Ondricek | Justin Grover | David Wilburn | Thanh Nguyen | M. Guido | Thanh Nguyen | Justin Grover | Jared Ondricek | D. Wilburn | Andrew Hunt
[1] Bill Hill,et al. Teleporter: An analytically and forensically sound duplicate transfer system , 2009, Digit. Investig..
[2] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Andrew Hoog. Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; John McCash, technical editor. , 2011 .
[4] Simson L. Garfinkel,et al. A general strategy for differential forensic analysis , 2012, Digit. Investig..
[5] Sylvain Ratabouil. Android NDK Beginner’s Guide , 2012 .
[6] Nicolas Christin,et al. Toward a general collection methodology for Android devices , 2011, Digit. Investig..
[7] Kevin D. Fairbanks. An analysis of Ext4 for digital forensics , 2012 .
[8] Angelos Stavrou,et al. Exploiting smart-phone USB connectivity for fun and profit , 2010, ACSAC '10.
[9] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[10] Nicolas Christin,et al. All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.
[11] Gary C. Kessler,et al. Android forensics: Simplifying cell phone examinations , 2010 .
[12] Paul Ferrill. Pro Android Python with SL4A , 2011 .
[13] Simson L. Garfinkel,et al. Digital forensics XML and the DFXML toolset , 2012, Digit. Investig..
[14] David Weinstein. A Security Hygienic Smart Charger for Mobile Devices , 2012 .