Evaluation of Android Malware Detection Based on System Calls
暂无分享,去创建一个
Simone Atzeni | Zvonimir Rakamaric | Marko Dimjasevic | Ivo Ugrina | Z. Rakamaric | I. Ugrina | Marko Dimjasevic | Simone Atzeni | Zvonimir Rakamaric
[1] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[2] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[3] Dawn Xiaodong Song,et al. TaintEraser: protecting sensitive data leaks using application-level taint tracking , 2011, OPSR.
[4] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[5] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[6] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[7] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[8] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[9] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[10] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[11] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[12] Tao Xie,et al. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[13] Gianluca Dini,et al. MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.
[14] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.
[15] Matthew Might,et al. Sound and precise malware analysis for android via pushdown reachability and entry-point saturation , 2013, SPSM '13.
[16] Isil Dillig,et al. Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.
[17] Max Kuhn,et al. Applied Predictive Modeling , 2013 .
[18] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[19] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[20] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[21] Matthew Might,et al. Fast Flow Analysis with Godel Hashes , 2014, 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation.
[22] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[23] Somesh Jha,et al. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[25] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[26] Z. Rakamaric,et al. Android Malware Detection Based on System Calls , 2015 .
[27] C. Pipper,et al. [''R"--project for statistical computing]. , 2008, Ugeskrift for laeger.
[28] Gemma C. Garriga,et al. Permutation Tests for Studying Classifier Performance , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[29] Lorenzo Martignoni,et al. Testing CPU emulators , 2009, ISSTA.
[30] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[31] Mark Stamp,et al. Support vector machines and malware detection , 2016, Journal of Computer Virology and Hacking Techniques.
[32] Mark Stamp,et al. Singular value decomposition and metamorphic detection , 2015, Journal of Computer Virology and Hacking Techniques.
[33] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[34] Ziming Zhao,et al. Morpheus: automatically generating heuristics to detect Android emulators , 2014, ACSAC '14.
[35] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[36] Konrad Rieck,et al. Structural detection of android malware using embedded call graphs , 2013, AISec.
[37] Sankardas Roy,et al. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps , 2014, CCS.
[38] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[39] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[40] Swarat Chaudhuri,et al. Extraction of statistically significant malware behaviors , 2013, ACSAC.