-
1
-
-
84891361159
-
-
Online; Accessed June 27 2013
-
Amazon Inc. Amazon Appstore for Android. http://www.amazon.com/mobile- apps/b?ie=UTF8&node=2350149011, Online; Accessed June 27 2013.
-
Amazon Appstore for Android
-
-
-
3
-
-
84893260920
-
-
APKTool Online; Accessed March 20 2013
-
APKTool. Reverse Engineering with apktool. https://code.google.com/ android/apk-tool, Online; Accessed March 20 2013.
-
Reverse Engineering with Apktool
-
-
-
4
-
-
84930503945
-
-
BakSmali Online; Accessed March 20 2013
-
BakSmali. Reverse Engineering with smali/baksmali. https://code.google. com/smali, Online; Accessed March 20 2013.
-
Reverse Engineering with Smali/Baksmali
-
-
-
5
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
New York, NY, USA ACM
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for Empirical analysis of Permission-Based Security models and its application to Android. In Proceedings of the 17th ACM conference on Computer and communications security, CCS'10, pages 73-84, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
6
-
-
84893281624
-
-
BlackHat Online; Accessed March 29 2013
-
BlackHat. Reverse Engineering with androguard. https://code.google.com/ androguard, Online; Accessed March 29 2013.
-
Reverse Engineering with Androguard
-
-
-
7
-
-
84893229737
-
Android malware past, present, and future
-
C. A. Castillo. Android Malware Past, Present, and Future. Technical report, MSWC, 2012.
-
(2012)
Technical Report, MSWC
-
-
Castillo, C.A.1
-
8
-
-
84893326924
-
-
Online; Accessed March 1 2013
-
Contagiodump. Contagio Malware Dump. http://contagiodump.blogspot.in/, Online; Accessed March 1 2013.
-
Contagio Malware Dump.
-
-
-
9
-
-
84893273938
-
-
Dex2Jar Online; Accessed May 15 2013
-
Dex2Jar. Adroid Decompiling with Dex2jar. http://code.google.com/p/ dex2jar/, Online; Accessed May 15 2013.
-
Adroid Decompiling with Dex2jar
-
-
-
10
-
-
85025700509
-
A study of android application security
-
Berkeley, CA, USA USENIX Association
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android application Security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21-21, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 21-21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
11
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS'11, pages 627-638, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
13
-
-
84864334986
-
RiskRanker: Scalable accurate zero-day android malware detection
-
NY, USA ACM
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: Scalable Accurate zero-day Android Malware detection. In 10th international conference on Mobile systems, applications, and services, MobiSys, pages 281-294, NY, USA, 2012. ACM.
-
(2012)
10th International Conference on Mobile Systems, Applications, and Services, MobiSys
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
14
-
-
84893314133
-
-
Online; Accessed March 5 2013
-
A. Inc. Class to Dex Conversion with Dx. http://developer.android.com/ tools/help/index.html, Online; Accessed March 5 2013.
-
Class to Dex Conversion with Dx
-
-
Inc, A.1
-
15
-
-
84893264576
-
-
Online; Accessed June 17
-
G. Inc. Android Smartphone Sales Report, 2013. http://www.gartner.com/ newsroom/id/2482816, Online; Accessed June 17.
-
(2013)
Android Smartphone Sales Report
-
-
-
16
-
-
84893248413
-
-
JD-GUI Online; Accessed May 15 2013
-
JD-GUI. Android Decompiling with JD-GUI. http://java.decompiler.free.fr/? q=jdgui, Online; Accessed May 15 2013.
-
Android Decompiling with JD-GUI
-
-
-
17
-
-
84868107162
-
-
Online; Accessed June 1 2012
-
Jon Oberhide. Dissecting The Android Bouncer. http://jon.oberheide.org/ blog/2012/06/21/âǎo, Online; Accessed June 1 2012.
-
Dissecting the Android Bouncer
-
-
-
18
-
-
33746191665
-
Identifying identical files using context triggered piecewise hashing
-
Sept.
-
J. Kornblum. Identifying Identical files using Context Triggered Piecewise Hashing. Digital Investigation., 3: 91-97, Sept. 2006.
-
(2006)
Digital Investigation
, vol.3
, pp. 91-97
-
-
Kornblum, J.1
-
21
-
-
84868524967
-
An evaluation of forensic similarity hashes
-
Aug.
-
V. Roussev. An evaluation of forensic similarity hashes. Digital Investigations, 8: S34-S41, Aug. 2011.
-
(2011)
Digital Investigations
, vol.8
-
-
Roussev, V.1
-
23
-
-
84893234977
-
PEAL-packed executable AnaLysis
-
SPRINGER
-
L. Vijay, G. Manoj Singh, F. Parvez, and N. Smita. PEAL-Packed Executable AnaLysis. In Proceedings of International Conference on Advanced Computing Networking and Security, ADCONS'11. SPRINGER, 2011.
-
(2011)
Proceedings of International Conference on Advanced Computing Networking and Security, ADCONS'11
-
-
Vijay, L.1
Singh, G.M.2
Parvez, F.3
Smita, N.4
-
24
-
-
84893258826
-
A study of android application security
-
San Francisco, ca USENIX
-
E. William, O. Damien, M. Patrick, and C. Swarat. A study of android application security. In USENIX Security'11, San Francisco, ca, 2011. USENIX.
-
(2011)
USENIX Security'11
-
-
William, E.1
Damien, O.2
Patrick, M.3
Swarat, C.4
-
27
-
-
84875665845
-
ADAM: An automatic and extensible platform to stress test android anti-virus systems
-
M. Zheng, P. P. C. Lee, and J. C. S. Lui. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. In DIMVA, pages 82-101, 2012.
-
(2012)
DIMVA
, pp. 82-101
-
-
Zheng, M.1
Lee, P.P.C.2
Lui, J.C.S.3
-
28
-
-
85011332360
-
DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware
-
M. Zheng, M. Sun, and J. C. S. Lui. DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. CoRR, 2013.
-
(2013)
CoRR
-
-
Zheng, M.1
Sun, M.2
Lui, J.C.S.3
-
29
-
-
84869439259
-
Hey, you get off my market: Detecting malicious apps in official and third party android markets
-
New York, NY, USA NDSS
-
W. Zhou, Y. Zhou, and X. Jiang. Hey, you get off my market: Detecting malicious apps in official and third party android markets. In Annual Network and Distributed Security Symposium, New York, NY, USA, 2012. NDSS.
-
(2012)
Annual Network and Distributed Security Symposium
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
-
30
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
New York, USA
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces. In Proceedings of Second ACM conference on Data Application Security and Privacy, CODASPY'12, pages 317-326, New York, USA, 2012.
-
(2012)
Proceedings of Second ACM Conference on Data Application Security and Privacy, CODASPY'12
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|