Detection of Mobile Malware in the Wild
暂无分享,去创建一个
[1] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[2] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[3] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[4] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[5] Byung-Gon Chun,et al. Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.
[6] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[7] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[8] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[9] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[10] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[11] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[12] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[13] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[14] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[15] Sahin Albayrak,et al. Detecting Symbian OS malware through static function call analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).