메뉴 건너뛰기




Volumn , Issue , 2014, Pages

DroidLegacy: Automated familial classification of Android malware

Author keywords

Android malware; Class dependence graphs; Familial classification; Malware detection; Module generation; Piggybacked malware; Signature generation; Static analysis

Indexed keywords

ANDROID (OPERATING SYSTEM); APPLICATION PROGRAMMING INTERFACES (API); CODES (SYMBOLS); MOBILE SECURITY; STATIC ANALYSIS;

EID: 84893970618     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2556464.2556467     Document Type: Conference Paper
Times cited : (121)

References (34)
  • 1
    • 85184290714 scopus 로고    scopus 로고
    • Android statistics, 2013. URL http://www.appbrain.com/stats/number-of- android-apps.
    • (2013) Android Statistics
  • 5
    • 85184291180 scopus 로고    scopus 로고
    • Oct.
    • M. Ballano. Android malware, Oct. 2012. URL http://www.itu.int/ITU-D/eur/ rf/cybersecurity/presentations/symantec-itu\-mobile.pdf.
    • (2012) Android Malware
    • Ballano, M.1
  • 9
    • 0000354976 scopus 로고
    • A comparative study of ordinary cross-validation, v-fold cross-validation and the repeated learning-testing methods
    • P. Burman. A comparative study of ordinary cross-validation, v-fold cross-validation and the repeated learning-testing methods. Biometrika, 76(3):503-514, 1989.
    • (1989) Biometrika , vol.76 , Issue.3 , pp. 503-514
    • Burman, P.1
  • 13
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • F. Cohen. Computer viruses: Theory and experiments. Computers & security, 6(1):22-35, 1987.
    • (1987) Computers & Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 14
    • 84865590234 scopus 로고    scopus 로고
    • Attack of the clones: Detecting cloned applications on android markets
    • Springer
    • J. Crussell, C. Gibler, and H. Chen. Attack of the clones: Detecting cloned applications on android markets. In Computer Security- ESORICS 2012, pages 37-54. Springer, 2012.
    • (2012) Computer Security- ESORICS 2012 , pp. 37-54
    • Crussell, J.1    Gibler, C.2    Chen, H.3
  • 15
    • 84877983602 scopus 로고    scopus 로고
    • Android: From reversing to decompilation
    • A. Desnos and G. Gueguen. Android: From reversing to decompilation. Proc. of Black Hat Abu Dhabi, 2011. URL http://code.google.com/p/androguard/.
    • (2011) Proc. of Black Hat Abu Dhabi
    • Desnos, A.1    Gueguen, G.2
  • 17
    • 0004161991 scopus 로고
    • Prentice- Hall Advanced Reference Series. Prentice Hall PTR, ISBN 9780130222787. URL
    • A. Jain and R. Dubes. Algorithms for clustering data. Prentice- Hall Advanced Reference Series. Prentice Hall PTR, 1988. ISBN 9780130222787. URL http://books.google.com/books?id=7eBQAAAAMAAJ.
    • (1988) Algorithms for Clustering Data
    • Jain, A.1    Dubes, R.2
  • 18
    • 80255126150 scopus 로고    scopus 로고
    • Malware classification based on call graph clustering
    • J. Kinable and O. Kostakis. Malware classification based on call graph clustering. Journal in Computer Virology, 7(4):233-245, 2011.
    • (2011) Journal in Computer Virology , vol.7 , Issue.4 , pp. 233-245
    • Kinable, J.1    Kostakis, O.2
  • 22
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
    • C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74(7):470-495, 2009.
    • (2009) Science of Computer Programming , vol.74 , Issue.7 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 23
    • 84893920335 scopus 로고    scopus 로고
    • Code protection in android
    • P. Schulz. Code protection in android. Technical report, University of Bonn, 2012. URL http://net.cs.uni-bonn.de/fileadmin/user\-upload/plohmann/2012- Schulz-Code\-Protection\-in\-Android.pdf.
    • (2012) Technical Report, University of Bonn
    • Schulz, P.1
  • 26
    • 67651224123 scopus 로고    scopus 로고
    • The software similarity problem in malware analysis
    • R. Koschke, E. Merlo, and A. Walenstein, editors, number 06301 in Dagstuhl Seminar Proceedings
    • A. Walenstein and A. Lakhotia. The software similarity problem in malware analysis. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, 2007.
    • (2007) Duplication, Redundancy, and Similarity in Software
    • Walenstein, A.1    Lakhotia, A.2
  • 27
    • 34548747253 scopus 로고    scopus 로고
    • The second international workshop on detection of software clones: Workshop report
    • A.Walenstein, A. Lakhotia, and R. Koschke. The second international workshop on detection of software clones: Workshop report. ACM SIGSOFT Software Engineering Notes, 29(2):1-5, 2004.
    • (2004) ACM SIGSOFT Software Engineering Notes , vol.29 , Issue.2 , pp. 1-5
    • Walenstein, A.1    Lakhotia, A.2    Koschke, R.3
  • 31
    • 0027188633 scopus 로고
    • Data structures and algorithms for nearest neighbor search in general metric spaces
    • Society for Industrial and Applied Mathematics
    • P. N. Yianilos. Data structures and algorithms for nearest neighbor search in general metric spaces. In Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms, pages 311-321. Society for Industrial and Applied Mathematics, 1993.
    • (1993) Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms , pp. 311-321
    • Yianilos, P.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.