Proteus: Detecting Android Emulators from Instruction-Level Profiles
暂无分享,去创建一个
[1] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[2] Qi Li,et al. RealDroid: Large-Scale Evasive Malware Detection on "Real Devices" , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[3] Mauro Conti,et al. Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android , 2017, ESORICS.
[4] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[5] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[6] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[7] Gabriel Negreira Barbosa,et al. Scientific but Not Academical Overview of Malware Anti-Debugging , Anti-Disassembly and Anti-VM Technologies , 2012 .
[8] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[9] Robert Chin. The Android Native Development Kit (NDK) , 2014 .
[10] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[11] Sotiris Ioannidis,et al. Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.
[12] Nicolas Christin,et al. Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.
[13] Stephen McCamant,et al. Path-exploration lifting: hi-fi tests for lo-fi emulators , 2012, ASPLOS XVII.
[14] Anthony C. J. Fox. Directions in ISA Specification , 2012, ITP.
[15] Christopher Krügel,et al. BareDroid: Large-Scale Analysis of Android Apps on Real Devices , 2015, ACSAC 2015.
[16] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[17] Lorenzo Martignoni,et al. Testing CPU emulators , 2009, ISSTA.
[18] Ziming Zhao,et al. Morpheus: automatically generating heuristics to detect Android emulators , 2014, ACSAC '14.
[19] Jelena Mirkovic,et al. Cardinal Pill Testing of System Virtual Machines , 2014, USENIX Security Symposium.
[20] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.