-
2
-
-
78649888272
-
Towards Understanding Malware Behaviour by the Extraction of API Calls
-
M. Alazab, S. Venkataraman, and P. Watters, "Towards Understanding Malware Behaviour by the Extraction of API Calls," in The second Cybercrime and Trustworthy Computing Workshop, Ballarat, Vic, 2010, pp. 52-59
-
The Second Cybercrime and Trustworthy Computing Workshop, Ballarat, Vic, 2010
, pp. 52-59
-
-
Alazab, M.1
Venkataraman, S.2
Watters, P.3
-
3
-
-
84868144659
-
Web Application Protection against SQL Injection Attack
-
Ammar Alazab, Moutaz Alazab, Jemal Abawajy, and M. Hobbs, "Web Application Protection against SQL Injection Attack," in 7th conference on Information Technology and Applications (ICITA 2011), Sydney, Australia, 2011.
-
7th Conference on Information Technology and Applications (ICITA 2011), Sydney, Australia, 2011
-
-
Alazab, A.1
Alazab, M.2
Abawajy, J.3
Hobbs, M.4
-
4
-
-
84866387223
-
Cybercrime: Current Trends of Malware Threats
-
presented at the International Conference on Democracy, Thessaloniki, Greece
-
M.Alazab, P.Watters, S.Venkatraman, M.Alazab, and A. Alazab, "Cybercrime: Current Trends of Malware Threats," presented at the International Conference on Democracy, CCIS series from Springer, Thessaloniki, Greece., 2011.
-
(2011)
CCIS Series from Springer
-
-
Alazab, M.1
Watters, P.2
Venkatraman, S.3
Alazab, M.4
Alazab, A.5
-
6
-
-
84870509534
-
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures
-
M. Alazab, S. Venkatraman, P. Watters, and M. Alazab, "Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures," in Ninth Australasian Data Mining Conference: AusDM 2011, Ballarat, Vic, 2011, pp. 171 -181.
-
Ninth Australasian Data Mining Conference: AusDM 2011, Ballarat, Vic, 2011
, pp. 171-181
-
-
Alazab, M.1
Venkatraman, S.2
Watters, P.3
Alazab, M.4
-
7
-
-
84866414581
-
-
Master, lectrical and Information Technology, Lund university, . Lund, Sweden
-
P. Lantz, "An Android Application Sandbox for Dynamic Analysis," Master, lectrical and Information Technology, Lund university, . Lund, Sweden, 2011.
-
(2011)
An Android Application Sandbox for Dynamic Analysis
-
-
Lantz, P.1
-
8
-
-
84866432488
-
-
L. M. Security , Dec 27. Available
-
L. M. Security. (2011, Dec 27). 'Lookout Mobile Threat Report'. Available: https://www.mylookout.com/-downloads/lookoutmobile-threat-report- 2011.pdf
-
(2011)
Lookout Mobile Threat Report
-
-
-
9
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, Chicago, Illinois, USA, 2011, pp. 3-14.
-
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, Illinois, USA, 2011
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
10
-
-
85037359376
-
-
J. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds., ed: Springer Berlin / Heidelberg
-
Y. Zhou, X. Zhang, X. Jiang, and V. Freeh, "Taming Information-Stealing Smartphone Applications (on Android), In Trust and Trustworthy Computing." vol. 6740, J. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds., ed: Springer Berlin / Heidelberg, 2011, pp. 93-107.
-
(2011)
Taming Information-Stealing Smartphone Applications (On Android), in Trust and Trustworthy Computing
, vol.6740
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
-
11
-
-
79952266600
-
Detection of Malicious Applications on Android OS
-
H. Sako, K. Franke, and S. Saitoh, Eds., ed: ' Springer Berlin / Heidelberg
-
F. Di Cerbo, A. Girardello, F. Michahelles, and S. Voronkova, "Detection of Malicious Applications on Android OS." vol. 6540, H. Sako, K. Franke, and S. Saitoh, Eds., ed: 'Computational Forensics' Springer Berlin / Heidelberg, 2011, pp. 138-149.
-
(2011)
Computational Forensics
, vol.6540
, pp. 138-149
-
-
Di Cerbo, F.1
Girardello, A.2
Michahelles, F.3
Voronkova, S.4
-
12
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in proceedings the 18th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2011, pp. 627-638.
-
Proceedings the 18th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, 2011
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
13
-
-
80051693391
-
-
N. Bjørner and V. Sofronie-Stokkermans, Eds., ed: Springer Berlin / Heidelberg
-
É. Payet and F. Spoto, "Static Analysis of Android Programs Automated Deduction." vol. 6803, N. Bjørner and V. Sofronie-Stokkermans, Eds., ed: Springer Berlin / Heidelberg, 2011, pp. 439-445.
-
(2011)
Static Analysis of Android Programs Automated Deduction
, vol.6803
, pp. 439-445
-
-
Payet, É.1
Spoto, F.2
-
14
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for Android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: behavior-based malware detection system for Android," in proceeding the 1st ACM workshop on Security and privacy in smartphones and mobile devices, Chicago, USA, 2011, pp. 15-26.
-
Proceeding the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, USA, 2011
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
15
-
-
84866381782
-
An Android Application Sandbox system for suspicious software detection
-
presented at the
-
Bla, x, T. sing, L. Batyuk, A. D. Schmidt, S. A. Camtepe, and S. Albayrak, "An Android Application Sandbox system for suspicious software detection," presented at the 5th International Conference on Malicious and Unwanted Software (MALWARE), Nancy, Lorraine 2010.
-
5th International Conference on Malicious and Unwanted Software (MALWARE), Nancy, Lorraine 2010
-
-
Bla, X.1
Sing, T.2
Batyuk, L.3
Schmidt, A.D.4
Camtepe, S.A.5
Albayrak, S.6
-
16
-
-
84866387232
-
-
Dec 26. Available
-
Android. (2011, Dec 26). Android Monkey tool, . Available: http://developer.android.com/guide/developing/tools/monkey.html,
-
(2011)
Android Monkey Tool
-
-
-
17
-
-
80755167433
-
-
Technical Report, Technische Universit Darmstadt
-
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, and Ahmad-Reza Sadeghi, "XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks," Technical Report, Technische Universit Darmstadt2011.
-
(2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
18
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid Android: versatile protection for smartphones," in 'Proceedings of the 26th Annual Computer Security Applications Conference', Austin, Texas, 2010, pp. 347-356.
-
'Proceedings of the 26th Annual Computer Security Applications Conference', Austin, Texas, 2010
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
19
-
-
77950675112
-
Google Android: A Comprehensive Security Assessment
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer, "Google Android: A Comprehensive Security Assessment," Security & Privacy, IEEE, vol. 8, pp. 35-44, 2010.
-
(2010)
Security & Privacy, IEEE
, vol.8
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
20
-
-
84866414592
-
-
Nov 1. Available
-
Mila. (2011, Nov 1). Mobile Malware Sample. Available: http://contagiominidump.blogspot.com/
-
(2011)
Mobile Malware Sample
-
-
Mila1
-
21
-
-
33748185183
-
ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS
-
A. Satoh and T. Inoue, "ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS," Integration, the VLSI Journal, vol. 40, pp. 3-10, 2007.
-
(2007)
Integration, the VLSI Journal
, vol.40
, pp. 3-10
-
-
Satoh, A.1
Inoue, T.2
-
22
-
-
84862129970
-
Feature Reduction to Speed up Malware Classification
-
Springer Berlin / Heidelberg
-
Veelasha Moonsamy, Ronghua Tian, and L. Batten, "Feature Reduction to Speed up Malware Classification," in the 16th Nordic Conference in Secure IT Systems (NordSec), Springer Berlin / Heidelberg, 2012, pp. 176-188.
-
(2012)
16th Nordic Conference in Secure IT Systems (NordSec)
, pp. 176-188
-
-
Moonsamy, V.1
Tian, R.2
Batten, L.3
-
23
-
-
84868144338
-
Smartphone Malware Based on Synchronization Vulnerabilities
-
M. Alazab, A. Alazab, and L. Batten, "Smartphone Malware Based On Synchronization Vulnerabilities," in proceeding of the 7th conference on Information Technology and Applications (ICITA), Sydney, Australia, 2011.
-
Proceeding of the 7th Conference on Information Technology and Applications (ICITA), Sydney, Australia, 2011
-
-
Alazab, M.1
Alazab, A.2
Batten, L.3
-
25
-
-
85076889619
-
TaintDroid: An Information- Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
William Enck, Peter Gilbert, Byung-gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and A. N. Sheth, "TaintDroid: An Information- Flow Tracking System for Realtime Privacy Monitoring on Smartphones," in proceeding of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10), Vancouver, Canada 2010.
-
Proceeding of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10), Vancouver, Canada 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
26
-
-
85037073388
-
-
M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds., ed: Springer Berlin / Heidelberg
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, "Privilege Escalation Attacks on Android Information Security." vol. 6531, M. Burmester, G. Tsudik, S. Magliveras, and I. Ilic, Eds., ed: Springer Berlin / Heidelberg, 2011, pp. 346-360.
-
(2011)
Privilege Escalation Attacks on Android Information Security.
, vol.6531
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
28
-
-
84856229434
-
Andromaly": A behavioral malware detection framework for android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ""Andromaly": a behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, pp. 1-30, 2011.
-
(2011)
Journal of Intelligent Information Systems
, pp. 1-30
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
30
-
-
77949354717
-
Visual analysis of malware behavior using treemaps and thread graphs
-
P. Trinius, T. Holz, J. Gobel, and F. C. Freiling, "Visual analysis of malware behavior using treemaps and thread graphs," in prcoeeding of the 6th International Workshop on Visualization for Cyber Security Atlantic City, NJ 2009, pp. 33-38.
-
Prcoeeding of the 6th International Workshop on Visualization for Cyber Security Atlantic City, NJ 2009
, pp. 33-38
-
-
Trinius, P.1
Holz, T.2
Gobel, J.3
Freiling, F.C.4
-
31
-
-
84866386535
-
-
Dec 15. Available
-
Kaspersky. (2011, Dec 15). ZeuS-in-the-Mobile for Android. Available: http://www.securelist.com/en/blog/208193029/ZeuS-in-the-Mobile-for-Android
-
(2011)
ZeuS-in-the-Mobile for Android
-
-
Kaspersky1
-
32
-
-
34047110218
-
Toward Automated Dynamic Malware Analysis Using CWSandbox
-
C. Willems, T. Holz, and F. Freiling, "Toward Automated Dynamic Malware Analysis Using CWSandbox," IEEE Security and Privacy, vol. 5, pp. 32-39, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
33
-
-
84866362970
-
-
Available
-
John Hunter and D. Dale. (2007). Matplotlib. Available: http://matplotlib.sourceforge.net/
-
(2007)
Matplotlib
-
-
Hunter, J.1
Dale, D.2
|