暂无分享,去创建一个
[1] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[2] Nicolas Christin,et al. Sweetening android lemon markets: measuring and combating malware in application marketplaces , 2013, CODASPY '13.
[3] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[4] Hongseok Yang,et al. Automated concolic testing of smartphone apps , 2012, SIGSOFT FSE.
[5] Hao Chen. Underground economy of android application plagiarism , 2013, SESP '13.
[6] Repeating History , 1980, Journal of public health policy.
[7] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[8] Hui Zang,et al. AdRob: examining the landscape and impact of android application plagiarism , 2013, MobiSys.
[9] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[10] Guofei Gu,et al. SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications , 2012, SPSM '12.
[11] Yuan Zhang,et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection , 2013, CCS.
[12] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[13] Mayur Naik,et al. Dynodroid: an input generation system for Android apps , 2013, ESEC/FSE 2013.
[14] Todd D. Millstein,et al. RERAN: Timing- and touch-sensitive record and replay for Android , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[15] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[16] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[17] Latin America 's Lab. Trends for 2013 Astounding growth of mobile malware , .
[18] Julian Schütte,et al. On the Effectiveness of Malware Protection on Android An evaluation of Android antivirus , 2013 .
[19] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[20] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[21] Andrea Valdi,et al. AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors , 2013, SPSM '13.
[22] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[23] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[24] Z. Meral Özsoyoglu,et al. Indexing large metric spaces for similarity search queries , 1999, TODS.
[25] Steve Hanna,et al. Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications , 2012, DIMVA.
[26] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.