Detection of repackaged Android Malware
暂无分享,去创建一个
[1] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[2] Hossain Shahriar,et al. A Survey of Android Malware Characterisitics and Mitigation Techniques , 2014, 2014 11th International Conference on Information Technology: New Generations.
[3] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[4] Brigitte Bigi,et al. Using Kullback-Leibler Distance for Text Categorization , 2003, ECIR.
[5] Sahin Albayrak,et al. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[6] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[7] Chao Yang,et al. Detecting money-stealing apps in alternative Android markets , 2012, CCS '12.
[8] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[9] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[10] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[11] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[12] Steve Hanna,et al. Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications , 2012, DIMVA.
[13] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[14] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[15] Yajin Zhou,et al. Detecting Passive Content Leaks and Pollution in Android Applications , 2013, NDSS.