SigPID: significant permission identification for android malware detection
暂无分享,去创建一个
Witawas Srisa-an | Qiben Yan | Zhiqiang Li | Yu Pan | Lichao Sun | W. Srisa-an | Qiben Yan | Lichao Sun | Zhiqiang Li | Yuchang Pan
[1] Ali A. Ghorbani,et al. Automated malware classification based on network behavior , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[2] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[3] Sung-Ju Lee,et al. Systematic Mining of Associated Server Herds for Malware Campaign Discovery , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[4] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[5] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[6] Sotiris Ioannidis,et al. Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.
[7] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[8] Joohan Lee,et al. A survey of data mining techniques for malware detection using file features , 2008, ACM-SE 46.
[9] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[10] Xiangliang Zhang,et al. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.
[11] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[12] Haibo He,et al. Learning from Imbalanced Data , 2009, IEEE Transactions on Knowledge and Data Engineering.
[13] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[14] Chun-Ying Huang,et al. Performance Evaluation on Permission-Based Detection for Android Malware , 2013 .
[15] David A. Wagner,et al. Reducing attack surfaces for intra-application communication in android , 2012, SPSM '12.
[16] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[17] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[18] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[19] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[20] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[21] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[22] Ian H. Witten,et al. Generating Accurate Rule Sets Without Global Optimization , 1998, ICML.
[23] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[24] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[25] Juan Caballero,et al. FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors , 2013, RAID.