-
1
-
-
84890612314
-
-
Accessed June 2013
-
http://www.theregister.co.uk/2012/09/26/google-play-25bn-downloads/, Accessed June 2013
-
-
-
-
2
-
-
84860619315
-
Reducing the window of opportunity for Android malware Gotta catch'em all
-
Apvrille, A., Strazzere, T.: 'Reducing the window of opportunity for Android malware Gotta catch'em all', J. Comput. Virol., 2012, 8, (1-2), pp. 61-71
-
(2012)
J. Comput. Virol
, vol.8
, Issue.1-2
, pp. 61-71
-
-
Apvrille, A.1
Strazzere, T.2
-
3
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
San Francisco, CA, USA, May 2012
-
Zhou, Y., Jiang, X.: 'Dissecting android malware: Characterization and evolution'. Proc. IEEE Symp. Security and Privacy (SP), San Francisco, CA, USA, May 2012, pp. 95-109
-
Proc.IEEE Symp. Security and Privacy (SP)
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
4
-
-
84868107162
-
Dissecting the android bouncer
-
Brooklyn, NY, USA, June 2012
-
Oberheide, J., Miller, C.: 'Dissecting the android bouncer'. SummerCon 2012, Brooklyn, NY, USA, June 2012
-
SummerCon 2012
-
-
Oberheide, J.1
Miller, C.2
-
5
-
-
85077723796
-
Cloudav: N-version antivirus in the network cloud
-
July
-
Oberheide, J., Cooke, E., Jahanian, F.: 'Cloudav: N-version antivirus in the network cloud'. Proc. 17th USENIX Security Symposium (Security '08), July 2008, pp. 91-106
-
(2008)
Proc. 17th USENIX Security Symposium (Security '08)
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
6
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Breckenridge, CO, USA June
-
Bose, A., Hu, X., Shin, K.G., Park, T.: 'Behavioral detection of malware on mobile handsets'. Proc. Sixth Int. Conf. Mobile Systems, Applications and Services (MobiSys '08) ACM, Breckenridge, CO, USA, June 2008, pp. 225-238
-
(2008)
Proc. Sixth Int. Conf. Mobile Systems, Applications and Services (MobiSys '08) ACM
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
7
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for Android
-
New York, NY, USA
-
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: 'Crowdroid: Behavior-based malware detection system for Android'. Proc. First ACM Workshop on Security and Privacy in Smartphones and Mobile devices (SPSM '11), New York, NY, USA, 2011, pp. 15-26
-
(2011)
Proc. First ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11)
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
8
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
Innsbruck, Austria, February 2008
-
Schmidt, A.-D., Peters, F., Lamour, F., Albayrak, S.: 'Monitoring smartphones for anomaly detection'. Proc. Int. Conf. Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE 2008), Innsbruck, Austria, February 2008
-
Proc. Int. Conf. Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE 2008)
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Albayrak, S.4
-
9
-
-
79961035117
-
Analyzing inter-application communication in Android
-
ACM, Washington, DC, USA, June
-
Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: 'Analyzing inter-application communication in Android'. Proc. Ninth Int. Conf. Mobile Systems, Applications, and Services (MobiSys '11). ACM, Washington, DC, USA, June 2011, pp. 239-252
-
(2011)
Proc. Ninth Int. Conf. Mobile Systems, Applications, and Services (MobiSys '11)
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
84860696959
-
DroidChecker: Analyzing android applications for capability leak
-
Tucson, AZ, USA, April
-
Chan, P.P.F., Hui, L.C.K., Yiu, S.M.: 'DroidChecker: Analyzing android applications for capability leak'. Proc. Fifth ACM Conf. Security and Privacy in Wireless and Mobile Networks (WISEC '12), Tucson, AZ, USA, April 2012, pp. 125-136
-
(2012)
Proc. Fifth ACM Conf. Security and Privacy in Wireless and Mobile Networks (WISEC '12)
, pp. 125-136
-
-
Chan, P.P.F.1
Hui, L.C.K.2
Yiu, S.M.3
-
11
-
-
84866608644
-
ProfileDroid: Multi-layer profiling of android applications
-
ACM, Istanbul, Turkey, August 2012
-
Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: 'ProfileDroid: Multi-layer profiling of android applications'. Proc. 18th Int. Conf. Mobile Computing and Networking (Mobicom '12). ACM, Istanbul, Turkey, August 2012, pp. 137-148
-
Proc. 18th Int. Conf. Mobile Computing and Networking (Mobicom '12)
, pp. 137-148
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
12
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day android malware detection
-
ACM, Low Wood Bay, Lake District, UK, June
-
Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: 'RiskRanker: Scalable and accurate zero-day android malware detection'. Proc. Tenth Int. Conf. Mobile Systems, Applications, and Services (MobiSys '12) ACM, Low Wood Bay, Lake District, UK, June 2012, pp. 281-294
-
(2012)
Proc. Tenth Int. Conf. Mobile Systems, Applications, and Services (MobiSys '12)
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
13
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
-
Fajardo, PR, USA, October
-
Batyuk, L., Herpich, M., Camtepe, S.A., Raddatz, K., Schmidt, A., Albayrak, S.: 'Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications'. Sixth Int. Conf. Malicious and Unwanted Software (MALWARE 2011), Fajardo, PR, USA, October 2011, pp. 66-72
-
(2011)
Sixth Int. Conf. Malicious and Unwanted Software (MALWARE 2011)
, pp. 66-72
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S.A.3
Raddatz, K.4
Schmidt, A.5
Albayrak, S.6
-
14
-
-
84893601570
-
SCANDAL: Static analyzer for detecting privacy leaks in Android applications
-
San Francisco, May
-
Kim, J., Yoon, Y., Yi, K., Shin, J.: 'SCANDAL: Static analyzer for detecting privacy leaks in Android applications'. Mobile Security Technologies, MoST 2012, San Francisco, May 2012
-
(2012)
Mobile Security Technologies, MoST 2012
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
-
15
-
-
84863084209
-
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
-
Vienna, Austria, June
-
Gibler, C., Crussell, J., Erickson, J., Chen, H.: 'AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale'. Proc. Fifth Int. Conf. Trust and Trustworthy Computing (TRUST 2012), Vienna, Austria, June 2012, pp. 291-307
-
(2012)
Proc. Fifth Int. Conf. Trust and Trustworthy Computing (TRUST 2012)
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
16
-
-
84863587187
-
A framework for static detection of privacy leaks in android applications
-
Trento, Italy, March
-
Mann, C., Starostin, A.: 'A framework for static detection of privacy leaks in android applications'. Proc. 27th Annual ACM Symp. Applied Computing (SAC'12), Trento, Italy, March 2012, pp. 1457-1462
-
(2012)
Proc. 27th Annual ACM Symp. Applied Computing (SAC'12)
, pp. 1457-1462
-
-
Mann, C.1
Starostin, A.2
-
17
-
-
78651410113
-
An Android application sandbox system for suspicious software detection
-
Nancy, France, October
-
Bläsing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S.A., Albayrak, S.: 'An Android application sandbox system for suspicious software detection'. Fifth Int. Conf. Malicious and Unwanted Software (MALWARE 2010), Nancy, France, October 2010, pp. 55-62
-
(2010)
Fifth Int. Conf. Malicious and Unwanted Software (MALWARE 2010)
, pp. 55-62
-
-
Bläsing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.A.4
Albayrak, S.5
-
18
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
June
-
Schmidt, A.-D., Bye, R., Schmidt, H.-G., et al.: 'Static analysis of executables for collaborative malware detection on android'. IEEE Int. Conf. Communications (ICC '09), Dresden, Germany, June 2009, pp. 1-5
-
(2009)
IEEE Int. Conf. Communications (ICC '09), Dresden, Germany
, pp. 1-5
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
-
19
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Oakland, CA, USA, May
-
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: 'Data mining methods for detection of new malicious executables'. Proc. 2001 IEEE Symposium on Security and Privacy (SP '01), Oakland, CA, USA, May 2001, pp. 38-49
-
(2001)
Proc. 2001 IEEE Symposium on Security and Privacy (SP '01)
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
20
-
-
52049124286
-
A virus prevention model based on static analysis and data mining methods
-
July
-
Wang, T.-Y., Wu, C.-H., Hsieh, C.-C.: 'A virus prevention model based on static analysis and data mining methods'. Proc. IEEE Eighth Int. Conf. Computer and Information Technology Workshops, Sydney, July 2008, pp. 288-293
-
(2008)
Proc. IEEE Eighth Int. Conf. Computer and Information Technology Workshops, Sydney
, pp. 288-293
-
-
Wang, T.-Y.1
Wu, C.-H.2
Hsieh, C.-C.3
-
21
-
-
82055172109
-
Using opcode sequences in single-class learning to detect unknown malware
-
Santos, I., Brezo, F., Sanz, B., Laorden, C., Bringas, P.G.: 'Using opcode sequences in single-class learning to detect unknown malware', IET Inf. Secur., 2011, 5, (4), pp. 220-227
-
(2011)
IET Inf. Secur
, vol.5
, Issue.4
, pp. 220-227
-
-
Santos, I.1
Brezo, F.2
Sanz, B.3
Laorden, C.4
Bringas, P.G.5
-
22
-
-
84868590213
-
A machine learning approach to Android malware detection
-
Odense, Denmark, August
-
Sahs, J., Khan, L.: 'A machine learning approach to Android malware detection'. Proc. European Intelligence and Security Informatics Conf., Odense, Denmark, August 2012, pp. 141-147
-
(2012)
Proc. European Intelligence and Security Informatics Conf
, pp. 141-147
-
-
Sahs, J.1
Khan, L.2
-
23
-
-
84868087373
-
PUMA: Permission usage to detect malware in Android
-
Sanz, B., Santos, I., Laorden, C., Ugarte-Pedro, X., Bringas, P.G., Alvarez, G.: 'PUMA: Permission usage to detect malware in Android'. Int. Joint Conf. CISIS'12-ICEUTÉ12-SOCÓ12 Special Sessions, in Advances in Intelligent Systems and Computing, Vol. 189, pp. 289-298
-
Int. Joint Conf. CISIS'12-ICEUTÉ12-SOCÓ12 Special Sessions, in Advances in Intelligent Systems and Computing
, vol.189
, pp. 289-298
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedro, X.4
Bringas, P.G.5
Alvarez, G.6
-
24
-
-
84890697141
-
-
Android Application Fundamentals Accessed June 2013
-
Android Application Fundamentals: Http://developer.android.com/guide/ components/fundamentals.html, Accessed June 2013
-
-
-
-
25
-
-
84890602077
-
-
Baksmali Accessed June 2013
-
Baksmali: Http://code.google.com/p/smali, Accessed June 2013
-
-
-
-
28
-
-
74049155830
-
On lightweight mobile phone application certification
-
Chicago, IL, USA, November
-
Enck, W., Ongtang, M., McDaniel, P.: 'On lightweight mobile phone application certification'. Proc. 16th ACM Conf. Computer and Communications Security (CCS '09), Chicago, IL, USA, November 2009, pp. 235-245
-
(2009)
Proc. 16th ACM Conf. Computer and Communications Security (CCS '09)
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
29
-
-
84867161056
-
Android malware past, present, and future
-
Accessed June 2013
-
Castillo, C.A.: 'Android malware past, present, and future'. McAfee White Paper, 2011, Accessed June 2013 http://www.mcafee.com/us/resources/white- papers/wp-android-malware-past-present-future.pdf
-
(2011)
McAfee White Paper
-
-
Castillo, C.A.1
-
30
-
-
84890686390
-
-
Accessed June 2013
-
Strazzere, T.: 'LeNa technical tear down'. Accessed June 2013, https://blog.lookout.com/wp-content/uploads/2011/10/LeNa-Legacy-Native-Teardown- Lookout-Mobile-Security1.pdf
-
LeNa Technical Tear Down
-
-
Strazzere, T.1
-
31
-
-
84890777019
-
-
Contagio mobile Accessed June 2013
-
Contagio mobile. http://contagiominidump.blogspot.com/, Accessed June 2013
-
-
-
-
32
-
-
84890691134
-
-
Andoid Malware Genome Project Accessed June 2013
-
Andoid Malware Genome Project: Http://www.malgenomeproject.org/, Accessed June 2013
-
-
-
-
33
-
-
84868259476
-
DroidMat: Android malware detection through manifest and API calls tracing
-
Dong-Jie, W., Ching-Hao, M., Te-En, W., Hahn-Ming, L., Kuo-Ping, W.: 'DroidMat: Android malware detection through manifest and API calls tracing'. Proc. Seventh Asia Joint Conf. Information Security (Asia JCIS), 2012, pp. 62-69
-
(2012)
Proc. Seventh Asia Joint Conf. Information Security (Asia JCIS)
, pp. 62-69
-
-
Dong-Jie, W.1
Ching-Hao, M.2
Te-En, W.3
Hahn-Ming, L.4
Kuo-Ping, W.5
-
34
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
Raleigh, NC, USA, October
-
Peng, H., Gates, C., Sarma, B., et al.: 'Using probabilistic generative models for ranking risks of android apps'. Proc. 19th ACM Conf. Computer and Communications Security (CCS 2012), Raleigh, NC, USA, October 2012, pp. 241-252
-
(2012)
Proc. 19th ACM Conf. Computer and Communications Security (CCS 2012)
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
-
35
-
-
84864033989
-
Android permissions: A perspective combining risks and benefits
-
June
-
Sarma, B., Gates, C., Li, N., Potharaju, R., Nita-Rotaru, C., Molloy, I.: 'Android permissions: A perspective combining risks and benefits'. Proc. 17th ACM Symp. Access Control Models and Technologies (SACMAT '12), June 2012, pp. 13-22
-
(2012)
Proc. 17th ACM Symp. Access Control Models and Technologies (S ACMAT '12)
, pp. 13-22
-
-
Sarma, B.1
Gates, C.2
Li, N.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
|