"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification
暂无分享,去创建一个
[1] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[2] Antonella Santone,et al. Download Malware? No, Thanks. How Formal Methods Can Block Update Attacks , 2016, 2016 IEEE/ACM 4th FME Workshop on Formal Methods in Software Engineering (FormaliSE).
[3] Alberto Bartoli,et al. Efficient Verification of a Multicast Protocol for Mobile Computing , 2001, Comput. J..
[4] Antonella Santone,et al. Ransomware Steals Your Phone. Formal Methods Rescue It , 2016, FORTE.
[5] Antonella Santone,et al. Identification of Android Malware Families with Model Checking , 2016, ICISSP.
[6] Eric Medvet,et al. Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[7] Juan E. Tapiador,et al. Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families , 2014, Expert Syst. Appl..
[8] Mark Stamp,et al. Hidden Markov models for malware classification , 2015, Journal of Computer Virology and Hacking Techniques.
[9] Glenn Bruns,et al. Distributed systems analysis with CCS , 1997 .
[10] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[11] Antonella Santone,et al. Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking , 2015, 2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering.
[12] Antonella Santone,et al. Hey Malware, I Can Find You! , 2016, 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
[13] Antonella Santone,et al. Abstract Interpretation and Model Checking for Checking Secure Information Flow in Concurrent Systems , 2003, Fundam. Informaticae.
[14] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[15] Gerardo Canfora,et al. An HMM and structural entropy based detector for Android malware: An empirical study , 2016, Comput. Secur..
[16] Alam Shahid,et al. DroidClone: Detecting android malware variants by exposing code clones , 2016 .
[17] Dan Arp,et al. Drebin : � Efficient and Explainable Detection of Android Malware in Your Pocket , 2014 .
[18] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[19] Antonella Santone,et al. Clone detection through process algebras and Java bytecode , 2011, IWSC '11.
[20] Mark Stamp,et al. Structural entropy and metamorphic malware , 2013, Journal of Computer Virology and Hacking Techniques.
[21] Vijay Laxmi,et al. AndroSimilar: Robust signature for detecting variants of Android malware , 2015, J. Inf. Secur. Appl..
[22] Rance Cleaveland,et al. The NCSU Concurrency Workbench , 1996, CAV.
[23] Colin Stirling,et al. An Introduction to Modal and Temporal Logics for CCS , 1991, Concurrency: Theory, Language, And Architecture.