Identifying Mobile Repackaged Applications through Formal Methods
暂无分享,去创建一个
Antonella Santone | Fabio Martinelli | Corrado Aaron Visaggio | Francesco Mercaldo | Vittoria Nardone | F. Martinelli | A. Santone | C. A. Visaggio | Vittoria Nardone | F. Mercaldo
[1] Antonella Santone,et al. Download Malware? No, Thanks. How Formal Methods Can Block Update Attacks , 2016, 2016 IEEE/ACM 4th FME Workshop on Formal Methods in Software Engineering (FormaliSE).
[2] Tayssir Touili,et al. Efficient Malware Detection Using Model-Checking , 2012, FM.
[3] Tayssir Touili,et al. Model-Checking for Android Malware Detection , 2014, APLAS.
[4] Franklin Tchakounté,et al. System Calls Analysis of Malwares on Android , 2013 .
[5] Antonella Santone,et al. Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking , 2015, 2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering.
[6] Roberto Barbuti,et al. A Notion of Non-Interference for Timed Automata , 2002, Fundam. Informaticae.
[7] Antonella Santone,et al. Identification of Android Malware Families with Model Checking , 2016, ICISSP.
[8] Antonella Santone,et al. Clone detection through process algebras and Java bytecode , 2011, IWSC '11.
[9] Tayssir Touili,et al. PoMMaDe: pushdown model-checking for malware detection , 2013, ESEC/FSE 2013.
[10] Roberto Barbuti,et al. Reduced Models for Efficient CCS Verification , 2005, Formal Methods Syst. Des..
[11] Kim G. Larsen,et al. CAAL: Concurrency Workbench, Aalborg Edition , 2015, ICTAC.
[12] Rance Cleaveland,et al. The NCSU Concurrency Workbench , 1996, CAV.
[13] Srdjan Capkun,et al. Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems , 2010 .
[14] Gerardo Canfora,et al. An HMM and structural entropy based detector for Android malware: An empirical study , 2016, Comput. Secur..
[15] Colin Stirling,et al. An Introduction to Modal and Temporal Logics for CCS , 1991, Concurrency: Theory, Language, And Architecture.
[16] Radu Mateescu,et al. CADP 2011: a toolbox for the construction and analysis of distributed processes , 2012, International Journal on Software Tools for Technology Transfer.
[17] Xiaojiang Du,et al. Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).
[18] Stefan Katzenbeisser,et al. Detecting Malicious Code by Model Checking , 2005, DIMVA.
[19] Sakir Sezer,et al. A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[20] Antonella Santone,et al. Ransomware Steals Your Phone. Formal Methods Rescue It , 2016, FORTE.
[21] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[22] Eric Filiol,et al. Formalization of Viruses and Malware Through Process Algebras , 2010, 2010 International Conference on Availability, Reliability and Security.
[23] Thomas Zimmermann,et al. Security Trend Analysis with CVE Topic Models , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.
[24] Julian Schütte,et al. On the Effectiveness of Malware Protection on Android An evaluation of Android antivirus , 2013 .
[25] Nicoletta De Francesco,et al. Checking secure information flow in Java bytecode by code transformation and standard bytecode verification , 2004, Softw. Pract. Exp..
[26] Ayumu Kubota,et al. Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[27] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[28] Rajiv Ranjan,et al. An integrated static detection and analysis framework for android , 2016, Pervasive Mob. Comput..
[29] Dan Arp,et al. Drebin : � Efficient and Explainable Detection of Android Malware in Your Pocket , 2014 .
[30] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .