E-Business and Telecommunications
暂无分享,去创建一个
[1] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[2] Mike Hibler,et al. The Flask Security Architecture: System Support for Diverse Security Policies , 1999, USENIX Security Symposium.
[3] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[4] Mark Stamp,et al. Profile hidden Markov models and metamorphic virus detection , 2009, Journal in Computer Virology.
[5] Gail-Joon Ahn,et al. Visualization-based policy analysis for SELinux: framework and user study , 2012, International Journal of Information Security.
[6] Haibo Shen. A Semantic-Aware Attribute-Based Access Control Model for Web Services , 2009, ICA3PP.
[7] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[8] Gerardo Canfora,et al. A Classifier of Malicious Android Applications , 2013, 2013 International Conference on Availability, Reliability and Security.
[9] Daniel Bilar,et al. Opcodes as predictor for malware , 2007, Int. J. Electron. Secur. Digit. Forensics.
[10] M. Masrom,et al. Opcodes histogram for classifying metamorphic portable executables malware , 2012, 2012 International Conference on E-Learning and E-Technologies in Education (ICEEE).
[11] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[12] Babak Bashari Rad,et al. Metamorphic Virus Variants Classification Using Opcode Frequency Histogram , 2011, ArXiv.
[13] Mark Stamp,et al. Structural entropy and metamorphic malware , 2013, Journal of Computer Virology and Hacking Techniques.
[14] C. R. Ramakrishnan,et al. Symbolic reachability analysis for parameterized administrative role-based access control , 2011, Comput. Secur..
[15] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[16] Julian Schütte,et al. On the Effectiveness of Malware Protection on Android An evaluation of Android antivirus , 2013 .
[17] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[18] Robert N. M. Watson,et al. A decade of OS access-control extensibility , 2013, CACM.
[19] Anthony Desnos,et al. Android: Static Analysis Using Similarity Distance , 2012, 2012 45th Hawaii International Conference on System Sciences.
[20] John C. S. Lui,et al. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[21] Stephen Smalley,et al. Configuring the SELinux Policy , 2008 .
[22] Luigi V. Mancini,et al. Towards a formal model for security policies specification and validation in the selinux system , 2004, SACMAT '04.
[23] Srdjan Capkun,et al. Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems , 2010 .
[24] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[25] Ninghui Li,et al. The Foundational Work of Harrison-Ruzzo-Ullman Revisited , 2013, IEEE Transactions on Dependable and Secure Computing.
[26] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.
[27] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[28] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[29] Arun Lakhotia,et al. Using engine signature to detect metamorphic malware , 2006, WORM '06.
[30] Michael Franz,et al. Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).