Security Toolbox for Detecting Novel and Sophisticated Android Malware
暂无分享,去创建一个
Suresh Kothari | Benjamin Holland | Jon Mathews | Tom Deering | Nikhil Ranade | S. Kothari | Benjamin Holland | Jon Mathews | Tom Deering | Nikhil Ranade
[1] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[2] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[3] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[4] Étienne Payet,et al. Static Analysis of Android Programs , 2011, CADE.
[5] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[6] Julian Schütte,et al. On the Effectiveness of Malware Protection on Android An evaluation of Android antivirus , 2013 .
[7] David F. Bacon,et al. Fast static analysis of C++ virtual function calls , 1996, OOPSLA '96.
[8] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[9] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[10] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[11] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[12] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[13] Suresh Kothari,et al. Atlas: a new way to explore software, build analysis tools , 2014, ICSE Companion.