Screening smartphone applications using malware family signatures
暂无分享,去创建一个
[1] Hao Chen,et al. AnDarwin: Scalable Detection of Semantically Similar Android Applications , 2013, ESORICS.
[2] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[3] Jiawei Zhu,et al. Permission-Based Abnormal Application Detection for Android , 2012, ICICS.
[4] Igor Santos,et al. MADS: Malicious Android Applications Detection through String Analysis , 2013, NSS.
[5] Byung-Gon Chun,et al. Vision: automated security validation of mobile apps at app markets , 2011, MCS '11.
[6] Konrad Rieck,et al. Structural detection of android malware using embedded call graphs , 2013, AISec.
[7] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[8] Arun Lakhotia,et al. DroidLegacy: Automated Familial Classification of Android Malware , 2014, PPREW'14.
[9] Heejo Lee,et al. Detecting metamorphic malwares using code graphs , 2010, SAC '10.
[10] Igor Santos,et al. Instance-based anomaly method for Android malware detection , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[11] Heejo Lee,et al. Screening Smartphone Applications Using Behavioral Signatures , 2013, SEC.
[12] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[13] Vijay Laxmi,et al. AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.
[14] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[15] John C. S. Lui,et al. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[16] Heejo Lee,et al. BinGraph: Discovering mutant malware using hierarchical semantic signatures , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[17] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[18] Juan E. Tapiador,et al. Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families , 2014, Expert Syst. Appl..
[19] Vijay Laxmi,et al. DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[20] Igor Santos,et al. Anomaly Detection Using String Analysis for Android Malware Detection , 2013, SOCO-CISIS-ICEUTE.