-
3
-
-
84877965984
-
-
DroidKungFu. http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu.html.
-
DroidKungFu
-
-
-
5
-
-
84877958876
-
-
ProGuard. http://proguard.sourceforge.net/.
-
ProGuard
-
-
-
9
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware malware detection. In Security and Privacy, 2005 IEEE Symposium on, 2005.
-
Security and Privacy, 2005 IEEE Symposium on, 2005
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
11
-
-
84877952544
-
-
February
-
CNET, February 2013. http://news.cnet.com/8301-1035-3-57569402-94/ android-ios-combine-for-91-percent-of-market/.
-
(2013)
-
-
-
12
-
-
0004046658
-
-
Technical report, Department of Computer Science, The University of Auckland, New Zealand
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical report, Department of Computer Science, The University of Auckland, New Zealand, 1997.
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
13
-
-
84877955401
-
-
F-Secure. Mobile Threat Report Q3 2012. http://www.f-secure.com/static/ doc/labs-global/Research/Mobile%20Threat%20Report%20Q3%202012.pdf.
-
(2012)
Mobile Threat Report Q3
-
-
-
14
-
-
77955210614
-
Synthesizing near-optimal malware specifications from suspicious behaviors
-
M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan. Synthesizing near-optimal malware specifications from suspicious behaviors. In Security and Privacy (SP), 2010 IEEE Symposium on, 2010.
-
Security and Privacy (SP), 2010 IEEE Symposium on, 2010
-
-
Fredrikson, M.1
Jha, S.2
Christodorescu, M.3
Sailer, R.4
Yan, X.5
-
15
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. Riskranker: scalable and accurate zero-day android malware detection. In Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, 2012.
-
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys '12, 2012
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
17
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In Proceedings of the 18th conference on USENIX security symposium, 2009.
-
Proceedings of the 18th Conference on USENIX Security Symposium, 2009
-
-
Kolbitsch, C.1
Comparetti, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
18
-
-
84865574920
-
-
February
-
H. Lockheimer. Android and security, February 2012. http://googlemobile. blogspot.com/2012/02/android-and-security.html.
-
(2012)
Android and Security
-
-
Lockheimer, H.1
-
19
-
-
84877986917
-
-
Geinimi Trojan Technical Analysis
-
Lookout. Geinimi Trojan Technical Analysis. http://blog.mylookout.com/ blog/2011/01/07/geinimi-trojan-technical-analysis/.
-
Lookout.
-
-
-
22
-
-
84874818406
-
-
Mobile Malware Mini Dump
-
M. Parkour. Contagio Mobile. Mobile Malware Mini Dump. http://contagiominidump.blogspot.com/.
-
Contagio Mobile
-
-
Parkour, M.1
-
23
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In Proceedings of the 2012 ACM conference on Computer and communications security, 2012.
-
Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
27
-
-
84877935546
-
-
Android's anti-malware system, June
-
R. Whitwam. Circumventing Google's Bouncer, Android's anti-malware system, June 2012. http://www.extremetech.com/computing/130424-circumventing- googles-bouncer-androids-anti-malware-system.
-
(2012)
Circumventing Google's Bouncer
-
-
Whitwam, R.1
-
28
-
-
84889078034
-
Adam: An automatic and extensible platform to stress test android anti-virus systems
-
M. Zheng, P. Lee, and J. Lui. Adam: An automatic and extensible platform to stress test android anti-virus systems. DIMVA, July 2012.
-
DIMVA, July 2012
-
-
Zheng, M.1
Lee, P.2
Lui, J.3
-
30
-
-
84869439259
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the 19th Network and Distributed System Security Symposium, 2012.
-
Proceedings of the 19th Network and Distributed System Security Symposium, 2012
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|