正在加载图片...
[10]X.C.Miao,R.Wang,L.Xu,W.F.Zhang and B.W.Xu.Security Network and Distribut ed System Security Symposium,NDSS14, Analysis for Android Applications Using Sensitive Path 2014. Identification.Joural of Software,2017,28(9) [19]AndroZoo.https://androzoo.uni.lu/. [11]D.Arp,M.Spreitzenbarth,M.Hubner,H.Gascon,and K.Rieck. [20]Y.Zhou and X.Jiang.Dissecting Android Malware:Characterization Drebin:Effective and explainable detection of android malware in and Evolution.In Proceedings of the IEEE Symposium on Security your pocket.In 2014 Network and Distributed System Security and Privacy (SP),pages 95-109,Washington,DC,USA,2012.IEEE Symposium,NDSS14,2014. Computer Society [12]Y.Aafer,W.L.Du and H.Yin.DroidAPIMiner:Min ing API-Level [21]VirusShare.https://virusshare.com/. Features for Robust Malware Detection in Android.International Conference on Security and Privacy in Communication Systems. [22]VirusTotal.https://www.virustotal.com/. Springer International Publishing,2013:86-103. [23]W.Enck,M.Ongtang,and P.McDaniel.On lightweight mobile [13]K.W.Y.Au,Y.F.Zhou,Z.Huang,and D.Lie.PScout:analyzing phone application certification.In Proceedings of the 16th ACM Conference on Computer and Commu nications Security.CCS 09. the Android permission specification.In Proceedings of the 19th Conference on Computer and Communications Security (CCS),pages pages 235-245,New York,NY.USA.2009.ACM 217-228,New York,NY,USA,2012.ACM. [24]H.Peng,C.Gates,B.Sarma,N.Li,Y.Qi,R,Potharaju,C.N.Rotaru [14]M.Hall,E.Frank,G.Holmes,B.Pfahringer,P.Reute mann and L. and I.Molloy.Using probabilistic generative models for ranking risks H.Witten.The WEKA data mining software:an update.ACM of android apps.Proceedings of the 2012 ACM conference on SIGKDD explorations newsletter,2009,11(1):10-18. Computer and commu nications security.ACM.2012:241-252. [15]Y.Zhauniarovich,M.Ahmad,O.Gadyatskaya,B.Crispo and F. [25]V.Moonsamy,J.Rong.S.Liu.Mining permission pat terns for Massacci.StaDynA:Addressing the Problem of Dy namic Code contrasting clean and malicious android appli cations.Future Updates in the Security Analysis of Android Applications Generation Computer Systems,2014,36:122-132. Proceedings of the 5th ACM Conference on Data and Application [26]L.Cen,C.S.Gates,L.Si and N.Li.A probabilistic discriminative Security and Privacy.ACM,2015:37-48. model for android malware detection with decompiled source code. [16]L.Li,D.Octeau.J.Klein.DroidRA:taming reflection to support EEE Transactions on Depend able and Secure Computing,2015, 12(4):400412. whole-program analysis of Android apps.Pro ceedings of the 25th Intemational Symposium on Software Testing and Analysis.ACM, [27]S.Y.Yerima,S.Sezer,G.McWilliams and I.Muttik.A new android 2016:318-329. malware detection approach using Bayesian classification.Advanced [17]Z.Cheng,F.Zeng,X.Zhong,M.Zhou,C.Lv,S.Guo.Resolving Information Networking and Applications (AINA),2013 IEEE 27th reflection methods in Android applica tions.Intelligence and Security International Con ference on.IEEE,2013:121-128. Informatics,2017 IEEE International Conference on.IEEE,2017: [28]H.Gascon,F.Yamaguchi,D.Arp and K.Rieck.Struc tural detection 143.145 of android malware using embedded call graphs.ACM Workshop on [18]S.Rasthofer,S.Arzt,and E.Bodden.A Machine leaming Approach Artificial Intelligence and Security.ACM,2013:45-54. for Classifying and Categorizing An droid Sources and Sinks.In 2014 59[10] X. C. Miao, R. Wang, L. Xu, W. F. Zhang and B. W. Xu. Security Analysis for Android Applications Using Sensitive Path Identification. Journal of Software, 2017, 28(9) . [11] D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck. Drebin: Effective and explainable detection of android malware in your pocket. In 2014 Network and Distributed System Security Symposium, NDSS14, 2014. [12] Y. Aafer, W. L. Du and H. Yin. DroidAPIMiner: Min ing API-Level Features for Robust Malware Detection in Android. International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2013:86-103. [13] K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. PScout: analyzing the Android permission specification. In Proceedings of the 19th Conference on Computer and Communications Security (CCS), pages 217-228, New York, NY, USA, 2012. ACM. [14] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reute mann and L. H. Witten. The WEKA data mining software:an update. ACM SIGKDD explorations newsletter, 2009, 11(1): 10-18. [15] Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo and F. Massacci. StaDynA: Addressing the Problem of Dy namic Code Updates in the Security Analysis of Android Applications. Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, 2015: 37-48. [16] L. Li, D. Octeau, J. Klein. DroidRA: taming reflection to support whole-program analysis of Android apps. Pro ceedings of the 25th International Symposium on Software Testing and Analysis. ACM, 2016: 318-329. [17] Z. Cheng, F. Zeng, X. Zhong, M. Zhou, C. Lv, S. Guo. Resolving reflection methods in Android applica tions. Intelligence and Security Informatics, 2017 IEEE International Conference on. IEEE, 2017: 143-145. [18] S. Rasthofer, S. Arzt, and E. Bodden. A Machine learning Approach for Classifying and Categorizing An droid Sources and Sinks. In 2014 Network and Distribut ed System Security Symposium, NDSS14, 2014. [19] AndroZoo. https://androzoo.uni.lu/. [20] Y. Zhou and X. Jiang. Dissecting Android Malware: Characterization and Evolution. In Proceedings of the IEEE Symposium on Security and Privacy (SP), pages 95-109, Washington, DC, USA, 2012. IEEE Computer Society. [21] VirusShare. https://virusshare.com/. [22] VirusTotal. https://www.virustotal.com/. [23] W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM Conference on Computer and Commu nications Security, CCS 09, pages 235-245, New York, NY, USA, 2009. ACM. [24] H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R, Potharaju, C. N. Rotaru and I. Molloy. Using probabilistic generative models for ranking risks of android apps. Proceedings of the 2012 ACM conference on Computer and commu nications security. ACM, 2012:241-252. [25] V. Moonsamy, J. Rong, S. Liu. Mining permission pat terns for contrasting clean and malicious android appli cations. Future Generation Computer Systems, 2014, 36: 122-132. [26] L. Cen, C. S. Gates, L. Si and N. Li. A probabilistic discriminative model for android malware detection with decompiled source code. IEEE Transactions on Depend able and Secure Computing, 2015, 12(4): 400-412. [27] S. Y. Yerima, S. Sezer, G. McWilliams and I. Muttik. A new android malware detection approach using Bayesian classification. Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Con ference on. IEEE, 2013: 121-128. [28] H. Gascon, F. Yamaguchi, D. Arp and K. Rieck. Struc tural detection of android malware using embedded call graphs. ACM Workshop on Artificial Intelligence and Security. ACM, 2013:45-54. 59
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有