-
1
-
-
84881069047
-
-
Available online, (Accessed 03 Oct. 2012)
-
Google celebrates as Android hits 25 billion downloads. The Register [Available online at: http://www.theregister.co.uk/2012/09/26/google-play-25bn- downloads/(Accessed 03 Oct. 2012)].
-
Google Celebrates as Android Hits 25 Billion Downloads
-
-
-
2
-
-
84860619315
-
Reducing the window of opportunity for android malware gotta catch em all
-
A. Apvrille and T. Strazzere, "Reducing the window of opportunity for Android malware Gotta catch 'em all, " Journal in Computer Virology, vol. 8, pp. 61-71, 2012.
-
(2012)
Journal in Computer Virology
, vol.8
, pp. 61-71
-
-
Apvrille, A.1
Strazzere, T.2
-
5
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
New York, NY, USA
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. "RiskRanker: scalable and accurate zero-day android malware detection, " Proc. 10th ACM international conference on Mobile Systems, Applications, and Services (MobiSys '12), New York, NY, USA, 281-294. 2012.
-
(2012)
Proc. 10th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys '12)
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
6
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
Innsbruck, Austria
-
A. -D. Schmidt, F. Peters, F. Lamour, and S. Albayrak, "Monitoring smartphones for anomaly detection, " Proc. MOBILWARE 2008, International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, Innsbruck, Austria, 2008.
-
(2008)
Proc. MOBILWARE 2008, International Conference on Mobile Wireless Middleware, Operating Systems, and Applications
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Albayrak, S.4
-
7
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Breckenridge, CO, USA: ACM
-
A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets, " Proc. 6th international Conference on mobile systems, applications and services. Breckenridge, CO, USA: ACM, 2008, pp. 225-238.
-
(2008)
Proc. 6th International Conference on Mobile Systems, Applications and Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
8
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
(New York, NY, USA), SPSM '11, ACM
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: behavior-based malware detection system for Android, " Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile devices (New York, NY, USA, 2011), SPSM '11, ACM, pp. 15-26.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
9
-
-
79961035117
-
Analyzing interapplication communication in android
-
New York
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing interapplication communication in Android, " Proc. 9th ACM international conference on Mobile systems, applications, and services (MobiSys '11), New York, pp. 239-252.
-
Proc. 9th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys '11)
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
84860696959
-
Droidchecker: Analyzing android applications for capability leak
-
New York, NY, USA
-
P. P. F. Chan, L. C.K. Hui, and S. M. Yiu, "DroidChecker: Analyzing android applications for capability leak, " Proc. fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12), New York, NY, USA, 125-136.
-
Proc. Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12)
, pp. 125-136
-
-
Chan, P.P.F.1
Hui, L.C.K.2
Yiu, S.M.3
-
11
-
-
84866608644
-
Profile Droid: Multi-layer profiling of android applications
-
New York
-
X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, "ProfileDroid: multi-layer profiling of android applications, " Proc. 18th annual international conference on Mobile computing and networking (Mobicom '12). New York, pp. 137-148, 2012.
-
(2012)
Proc. 18th Annual International Conference on Mobile Computing and Networking (Mobicom '12)
, pp. 137-148
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
12
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications
-
L. Batyuk, M. Herpich, S. A. Camtepe, K. Raddatz, A. Schmidt, S. Albayrak, "Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications, " Malicious and Unwanted Software (MALWARE 2011), 6th International Conference, 2011.
-
(2011)
Malicious and Unwanted Software (MALWARE 2011), 6th International Conference
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S.A.3
Raddatz, K.4
Schmidt, A.5
Albayrak, S.6
-
13
-
-
84920514359
-
-
[Available], last accessed Sept. 2012
-
J. Kim, Y. Yoon, K. Yi, and J. Shin, "SCANDAL: Static analyzer for detecting privacy leaks in Android applications, " Mobile Security Technologies MoST 2012 [Available at: http://mostconf.org/2012/papers/26.pdf], last accessed Sept. 2012.
-
(2012)
SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
-
14
-
-
84877950290
-
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
June
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen, "AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale, " In: Trust and Trustworthy Computing (June 2012).
-
(2012)
Trust and Trustworthy Computing
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
16
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
19-20 Oct.
-
T. Bla sing, L. Batyuk, A.-D Schmidt, S. A. Camtepe, S. Albayrak, "An Android Application Sandbox system for suspicious software detection, " Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, vol., no., pp.55-62, 19-20 Oct. 2010.
-
(2010)
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on
, pp. 55-62
-
-
Sing, T.B.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.A.4
Albayrak, S.5
-
17
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
14-18 June
-
A.-D. Schmidt et al., "Static analysis of executables for collaborative malware detection on Android, " Communications, 2009 ICC '09 IEEE International Conference on, vol., no., pp.1-5, 14-18 June 2009.
-
(2009)
Communications, 2009 ICC '09 IEEE International Conference on
, pp. 1-5
-
-
Schmidt, A.-D.1
-
18
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Washington, DC, USA, IEEE Computer Society
-
M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, "Data mining methods for detection of new malicious executables, " Proc. IEEE Symposium on Security and Privacy, SP '01, pages 38, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
Proc. IEEE Symposium on Security and Privacy, SP '01
, pp. 38
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
19
-
-
52049124286
-
A virus prevention model based on static analysis and data mining methods
-
Sydney, 8-11 July
-
T-Y. Wang, C-H. Wu, C-C. Hsieh, "A virus prevention model based on static analysis and data mining methods, " in Proc. IEEE 8th International Conference on Computer and Information Technology Workshops, 2008, Sydney, 8-11 July 2008, pp. 288-293.
-
(2008)
Proc. IEEE 8th International Conference on Computer and Information Technology Workshops, 2008
, pp. 288-293
-
-
Wang, T.-Y.1
Wu, C.-H.2
Hsieh, C.-C.3
-
23
-
-
84881081204
-
-
online
-
Baksmali. [online]: http://code.google.com/p/smali.
-
-
-
Baksmali1
-
24
-
-
84881070270
-
Malware mining
-
5-7 Oct., Barcelona, Spain
-
I. Muttik, "Malware mining, " Proc. 21st Virus Bulletin International Conference, VB2011, 5-7 Oct. 2011, Barcelona, Spain.
-
(2011)
Proc. 21st Virus Bulletin International Conference, VB2011
-
-
Muttik, I.1
|