暂无分享,去创建一个
Ling Huang | Vijay Janapa Reddi | Mohit Tiwari | Mikhail Kazdagli | Ling Huang | V. Reddi | Mohit Tiwari | Mikhail Kazdagli
[1] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[2] Yajin Zhou,et al. Fast, scalable detection of "Piggybacked" mobile applications , 2013, CODASPY.
[3] Juan del Cuvillo,et al. Using innovative instructions to create trustworthy software solutions , 2013, HASP '13.
[4] Ling Huang,et al. Morpheus: benchmarking computational diversity in mobile malware , 2014, HASP@ISCA.
[5] Salvatore J. Stolfo,et al. Unsupervised Anomaly-Based Malware Detection Using Hardware Features , 2014, RAID.
[6] EMMANOUIL VASILOMANOLAKIS,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..
[7] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[8] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[9] Jaideep Chandrashekar,et al. When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions , 2006, AAAI.
[10] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[11] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[12] Michael D. Ernst,et al. Collaborative Verification of Information Flow for a High-Assurance App Store , 2014, Software Engineering & Management.
[13] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[14] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[15] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[16] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[17] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[18] Christopher Krügel,et al. A quantitative study of accuracy in system call-based malware detection , 2012, ISSTA 2012.
[19] Andrew W. Moore,et al. X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.
[20] Nael B. Abu-Ghazaleh,et al. Malware-aware processors: A framework for efficient online malware detection , 2015, 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA).
[21] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[22] David A. Wagner,et al. Bifocals: Analyzing WebView Vulnerabilities in Android Applications , 2013, WISA.
[23] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[24] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[25] Nael B. Abu-Ghazaleh,et al. Ensemble Learning for Low-Level Hardware-Supported Malware Detection , 2015, RAID.
[26] Alex M. Andrew,et al. Boosting: Foundations and Algorithms , 2012 .
[27] Steve Hanna,et al. Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications , 2012, DIMVA.
[28] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[29] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[30] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[31] Isil Dillig,et al. Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.