Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware
暂无分享,去创建一个
[1] Peng Wang,et al. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale , 2015, USENIX Security Symposium.
[2] Hao Chen,et al. AnDarwin: Scalable Detection of Semantically Similar Android Applications , 2013, ESORICS.
[3] Jan Hauke,et al. Comparison of Values of Pearson's and Spearman's Correlation Coefficients on the Same Sets of Data , 2011 .
[4] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[5] Dawn Xiaodong Song,et al. NetworkProfiler: Towards automatic fingerprinting of Android apps , 2013, 2013 Proceedings IEEE INFOCOM.
[6] Sencun Zhu,et al. ViewDroid: towards obfuscation-resilient mobile application repackaging detection , 2014, WiSec '14.
[7] Yajin Zhou,et al. Fast, scalable detection of "Piggybacked" mobile applications , 2013, CODASPY.
[8] Vijay Laxmi,et al. AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.
[9] Steve Hanna,et al. Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications , 2012, DIMVA.
[10] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[11] William G. Griswold,et al. Dynamically discovering likely program invariants to support program evolution , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[12] Matteo Pomilia. A study on obfuscation techniques for Android malware , 2016 .
[13] Isil Dillig,et al. Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.
[14] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[15] Michael I. Jordan,et al. Scalable statistical bug isolation , 2005, PLDI '05.
[16] Sarita V. Adve,et al. Using likely program invariants to detect hardware errors , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).