-
2
-
-
84858392040
-
A survey on automated dynamic malware analysis techniques and tools
-
M. Egele et al., "A Survey on Automated Dynamic Malware Analysis Techniques and Tools," ACM Computing Surveys, 2012; https://www.seclab. tuwien.ac.at/papers/malware-survey.pdf.
-
(2012)
ACM Computing Surveys
-
-
Egele, M.1
-
5
-
-
85025700509
-
A study of android application security
-
W. Enck et al., "A Study of Android Application Security," Proc. 20th Usenix Security Symp., Usenix, 2011; http://static.usenix.org/events/ sec11/tech/full-papers/Enck.pdf.
-
(2011)
Proc. 20th Usenix Security Symp.
-
-
Enck, W.1
-
6
-
-
79955570859
-
Taint droid: An information-flow tracking system for real-time privacy monitoring on smartphones
-
W. Enck, "TaintDroid: An Information-Flow Tracking System for Real-Time Privacy Monitoring on Smartphones," Proc. 9th Usenix Symp. Operating Systems Design and Implementation (OSDI 10), Usenix, 2010; http://static.usenix.org/events/osdi10/tech/full-papers/Enck.pdf.
-
(2010)
Proc. 9th Usenix Symp. Operating Systems Design and Implementation (OSDI 10)
-
-
Enck, W.1
-
8
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On Lightweight Mobile Phone Application Certification," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM, 2009, pp. 235-245.
-
(2009)
Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
9
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera et al., "A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android," Proc. 17th ACM Conf. Computer and Communications Security (CCS 10), ACM, 2010, pp. 73-84.
-
(2010)
Proc. 17th ACM Conf. Computer and Communications Security (CCS 10), ACM
, pp. 73-84
-
-
Barrera, D.1
-
13
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: Behavior-Based Malware Detection System for Android," Proc. ACM Workshop Security and Privacy in Mobile Devices (SPMD 11), ACM, 2011, pp. 15-26.
-
(2011)
Proc. ACM Workshop Security and Privacy in Mobile Devices (SPMD 11), ACM
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
14
-
-
85077723796
-
Cloud AV: N-version antivirus in the network cloud
-
Usenix
-
J. Oberheide, E. Cooke, and F. Jahanian, "CloudAV: N-Version Antivirus in the Network Cloud," Proc. 17th Conf. Security Symp., Usenix, 2008, pp. 91-106.
-
(2008)
Proc. 17th Conf. Security Symp.
, pp. 91-106
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
15
-
-
76649138917
-
Virus meter: Preventing your cellphone from spies
-
Springer
-
L.G. Liu, Y. Zhang, and S. Chen, "VirusMeter: Preventing Your Cellphone from Spies," Proc. Int'l Symp. Research in Attacks, Intrusions, and Defenses (RAID 09), LNCS 5758, Springer, 2009, pp. 244-264.
-
(2009)
Proc. Int'l Symp. Research in Attacks, Intrusions, and Defenses (RAID 09), LNCS 5758
, pp. 244-264
-
-
Liu, L.G.1
Zhang, Y.2
Chen, S.3
|