暂无分享,去创建一个
[1] Xuxian Jiang,et al. Design and implementation of an Android host-based intrusion prevention system , 2014, ACSAC.
[2] Mansour Ahmadi,et al. DroidScribe: Classifying Android Malware Based on Runtime Behavior , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[3] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[4] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[5] Christopher Krügel,et al. Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy , 2016, NDSS.
[6] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[7] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[8] Edgar R. Weippl,et al. Enter Sandbox: Android Sandbox Comparison , 2014, ArXiv.
[9] Chao Yang,et al. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications , 2014, ESORICS.
[10] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[11] I. Jolliffe. Principal Component Analysis , 2002 .
[12] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[13] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[14] Ke Xu,et al. ICCDetector: ICC-Based Malware Detection on Android , 2016, IEEE Transactions on Information Forensics and Security.
[15] YangMin,et al. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps , 2014 .
[16] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[17] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[18] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[19] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[20] Ziming Zhao,et al. Morpheus: automatically generating heuristics to detect Android emulators , 2014, ACSAC '14.
[21] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[22] Dawn Xiaodong Song,et al. Limits of Learning-based Signature Generation with Adversaries , 2008, NDSS.
[23] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[24] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[25] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[26] Yuan Zhang,et al. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps , 2014, IEEE Transactions on Information Forensics and Security.
[27] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[28] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[29] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[30] Nicolas Christin,et al. Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.
[31] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[32] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[33] Yanick Fratantonio,et al. ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[34] Gianluca Dini,et al. MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.
[35] Zhenkai Liang,et al. Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android , 2016, IEEE Transactions on Information Forensics and Security.
[36] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[37] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[38] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[39] Gianluca Dini,et al. MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention , 2018, IEEE Transactions on Dependable and Secure Computing.
[40] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[41] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[42] BongNam Noh,et al. Android platform based linux kernel rootkit , 2011, 2011 6th International Conference on Malicious and Unwanted Software.