The Concept of Attack Scenarios and Its Applications in Android Malware Detection
暂无分享,去创建一个
[1] Christopher Krügel,et al. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications , 2014, NDSS.
[2] John C. S. Lui,et al. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Gonzalo Álvarez,et al. MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID , 2013, Cybern. Syst..
[4] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[5] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[6] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[7] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[8] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[9] Michalis Faloutsos,et al. Permission evolution in the Android ecosystem , 2012, ACSAC '12.
[10] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[11] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[12] Masoud Nikravesh,et al. Feature Extraction - Foundations and Applications , 2006, Feature Extraction.
[13] David W. Aha,et al. Instance-Based Learning Algorithms , 1991, Machine Learning.
[14] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[15] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[16] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[17] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[18] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[19] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[20] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[21] Xingquan Zhu,et al. Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.
[22] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[23] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[24] Toshiaki Tanaka,et al. A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework , 2010, 2010 IEEE Second International Conference on Social Computing.
[25] Toshiaki Tanaka,et al. Towards Formal Analysis of the Permission-Based Security Model for Android , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.
[26] Shih-Hao Hung,et al. DroidDolphin: a dynamic Android malware detection framework using big data and machine learning , 2014, RACS '14.
[27] Patrick D. McDaniel,et al. Semantically rich application-centric security in Android , 2012 .
[28] Nello Cristianini,et al. An introduction to Support Vector Machines , 2000 .
[29] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.