Divide-and-Conquer: Why Android Malware Cannot Be Stopped
暂无分享,去创建一个
[1] Herbert Bos,et al. Dynamic Analysis of Android Malware , 2013 .
[2] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[3] Felix C. Freiling,et al. Towards Dynamic Malware Analysis to Increase Mobile Device Security423 , 2008, Sicherheit.
[4] Engin Kirda,et al. A View on Current Malware Behaviors , 2009, LEET.
[5] Michael Spreitzenbarth,et al. Dissecting the Droid: Forensic Analysis of Android and its malicious Applications (Sezierung eines Androiden) , 2013 .
[6] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[7] Michael Becher,et al. Kernel-Level Interception and Applications on Mobile Devices , 2008 .
[8] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[9] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[10] Christopher Krügel,et al. BareBox: efficient malware analysis on bare-metal , 2011, ACSAC '11.
[11] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[12] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[13] Julian Schütte,et al. On the Effectiveness of Malware Protection on Android An evaluation of Android antivirus , 2013 .
[14] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[15] Hubert Ritzdorf,et al. Analysis of the communication between colluding applications on modern smartphones , 2012, ACSAC '12.
[16] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[17] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[18] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[19] Julian Schütte,et al. Native code execution control for attack mitigation on android , 2013, SPSM '13.
[20] Thomas Schreck,et al. Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.
[21] Julian Schütte,et al. An antivirus API for Android malware recognition , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).
[22] Tilo Müller,et al. PANDORA applies non-deterministic obfuscation randomly to Android , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).
[23] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[24] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[25] Chi-Sung Laih,et al. Malware Virtualization-Resistant Behavior Detection , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[26] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[27] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..