메뉴 건너뛰기




Volumn 39, Issue PART B, 2013, Pages 340-350

Identifying android malicious repackaged applications by thread-grained system call sequences

Author keywords

Android; Dynamic analysis; Longest common substring; Malicious repackaged applications; System call

Indexed keywords

ANDROID; ANDROID SECURITIES; COMMON SUBSEQUENCE; DETECTION MECHANISM; LONGEST COMMON SUBSTRING; MALICIOUS BEHAVIOR; SYSTEM CALLS; SYSTEM-CALL SEQUENCE;

EID: 84888862842     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.08.010     Document Type: Article
Times cited : (86)

References (27)
  • 1
    • 84888867127 scopus 로고    scopus 로고
    • Android.Adrd|symantec
    • Android.Adrd|symantec. Available at: http://www.symantec.com/security- response/writeup.jsp?docid=2011-021514-4954-99.
  • 2
    • 84888860914 scopus 로고    scopus 로고
    • Android.Basebridge
    • Android.Basebridge. Available at: http://www.symantec.com/security- response/writeup.jsp?docid=2011-060915-4938-99.
  • 9
    • 84888868641 scopus 로고    scopus 로고
    • Encyclopedia entry: Trojan:AndroidOS/Kmin.A
    • Encyclopedia entry: Trojan:AndroidOS/Kmin.A. Available at: http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name= Trojan%3AAndroidOS%2FKmin.A.
  • 16
    • 84888880368 scopus 로고    scopus 로고
    • Security alert: Zsone Trojan found in Android market
    • Security alert: Zsone Trojan found in Android market. Available at: https://blog.lookout.com/blog/2011/05/11/security-alert-zsone-trojan-found-in- android-market/.
  • 18
    • 84888867045 scopus 로고    scopus 로고
    • Strace
    • Strace. Available at: http://sourceforge.net/projects/strace/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.