暂无分享,去创建一个
Edgar R. Weippl | Victor van der Veen | Georg Merzdovnik | Martina Lindorfer | Markus Huber | Martin Mulazzani | Sebastian Neuner
[1] Herbert Bos,et al. Dynamic Analysis of Android Malware , 2013 .
[2] Christopher Krügel,et al. The power of procrastination: detection and mitigation of execution-stalling malicious code , 2011, CCS '11.
[3] Markus Zeilinger,et al. ANANAS - A Framework for Analyzing Android Applications , 2013, 2013 International Conference on Availability, Reliability and Security.
[4] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[5] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[6] Andrea Valdi,et al. AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors , 2013, SPSM '13.
[7] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[8] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[9] Peter Ferrie. Attacks on More Virtual Machine Emulators , 2007 .
[10] Thomas Schreck,et al. Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.
[11] Min Gyung Kang,et al. Emulating emulation-resistant malware , 2009, VMSec '09.
[12] Canalys. Over 1 billion Android-based smart phones to ship in 2017 , 2013 .
[13] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[14] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[15] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY '13.
[16] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[17] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[18] Anthony Desnos. Android: From Reversing to Decompilation , 2011 .
[19] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[20] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[21] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[22] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[23] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[24] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[25] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[26] Yanick Fratantonio,et al. Andrubis: Android Malware Under the Magnifying Glass , 2014 .
[27] Dongwan Shin,et al. Towards preventing QR code based attacks on android phone using security warnings , 2013, ASIA CCS '13.
[28] Jeremy Clark,et al. Understanding and improving app installation security mechanisms through empirical analysis of android , 2012, SPSM '12.
[29] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[30] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[31] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[32] Guofei Gu,et al. SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications , 2012, SPSM '12.