Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
暂无分享,去创建一个
Yajin Zhou | Zhi Wang | Xuxian Jiang | Wu Zhou | Yajin Zhou | Xuxian Jiang | Zhi Wang | Wu Zhou
[1] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[2] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[3] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[4] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[5] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[6] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[7] Shivakant Mishra,et al. Location based power analysis to detect malicious code in smartphones , 2011, SPSM '11.
[8] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[9] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[10] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[11] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[12] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[13] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[14] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[15] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[16] Jeremy Andrus,et al. Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.
[17] Jean-Pierre Seifert,et al. pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.
[18] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[19] Matthias Lange,et al. L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.
[20] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[21] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[22] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[23] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[24] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[25] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[26] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[27] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[28] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.