-
2
-
-
84897732658
-
-
Beijing: China Publishing House of Electronics Industry, January 8
-
J. Wu, On Top of Tides (Chinese Edition), Beijing: China Publishing House of Electronics Industry, January 8, 2011.
-
(2011)
On Top of Tides (Chinese Edition)
-
-
Wu, J.1
-
4
-
-
84897680303
-
-
September 11
-
Gartner, http://www.gartner.com/it/page.jsp?id=2153215, September 11, 2012.
-
(2012)
-
-
-
6
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to Android
-
Chicago, USA
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to Android, in Proc. 17th ACM Conference on Computer and Communications Security, Chicago, USA, 2010, pp. 73-84.
-
(2010)
Proc. 17th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
7
-
-
85025700509
-
A study of android application security
-
San Francisco, USA
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, A study of android application security, in USENIX Security Symposium, San Francisco, USA, 2011.
-
(2011)
USENIX Security Symposium
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
8
-
-
80755187788
-
Android permissions demystified
-
Chicago, USA
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, in Proc. 18th ACM Conference on Computer and Communications Security, Chicago, USA, 2011, pp. 627-638.
-
(2011)
Proc. 18th ACM Conference on Computer and Communications Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
9
-
-
84877931620
-
User-centric dependence analysis for identifying malicious mobile apps
-
San Francisco, USA
-
K. O. Elish, D. Yao, and B. G. Ryder, User-centric dependence analysis for identifying malicious mobile apps, in Workshop on Mobile Security Technologies (MoST), San Francisco, USA, 2012.
-
(2012)
Workshop on Mobile Security Technologies (MoST)
-
-
Elish, K.O.1
Yao, D.2
Ryder, B.G.3
-
10
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for Android
-
Chicago, USA
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, Crowdroid: Behavior-based malware detection system for Android, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, USA, 2011, pp. 15-26.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
11
-
-
84877942991
-
Slicing droids: Program slicing for smali code
-
Coimbra, Portugal
-
J. Hoffmann, M. Ussath, T. Holz, and M. Spreitzenbarth, Slicing droids: Program slicing for smali code, in Proc. 28th Annual ACM Symposium on Applied Computing, Coimbra, Portugal, 2013, pp. 1844-1851.
-
(2013)
Proc. 28th Annual ACM Symposium on Applied Computing
, pp. 1844-1851
-
-
Hoffmann, J.1
Ussath, M.2
Holz, T.3
Spreitzenbarth, M.4
-
12
-
-
84855753441
-
Automated remote repair for mobile malware
-
Orlando, USA
-
Y. Nadji, J. Giffin, and P. Traynor, Automated remote repair for mobile malware, in Proc. 27th Annual ACM Computer Security Applications Conference, Orlando, USA, 2011, pp. 413-422.
-
(2011)
Proc. 27th Annual ACM Computer Security Applications Conference
, pp. 413-422
-
-
Nadji, Y.1
Giffin, J.2
Traynor, P.3
-
13
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
Austin, USA
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, Paranoid Android: Versatile protection for smartphones, in Proc. 26th Annual ACM Computer Security Applications Conference, Austin, USA, 2010, pp. 347-356.
-
(2010)
Proc. 26th Annual ACM Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
14
-
-
85172622386
-
Hey, you get off of my market: Detecting malicious apps in official and alternative Android markets
-
San Diego, USA
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets, in Proc. 19th Annual Network and Distributed System Security Symposium, San Diego, USA, 2012.
-
(2012)
Proc. 19th Annual Network and Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
15
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on Android
-
A. D. Schmidt, R. Bye, H. G. Schmidt, J. Clausen, O. Kiraz, K. A. Yuksel, S. A. Camtepe, and S. Albayrak, Static analysis of executables for collaborative malware detection on Android, in Communications, ICC'09, IEEE International Conference on, Dresden, Germany, 2009.
-
(2009)
Communications, ICC'09, IEEE International Conference On, Dresden, Germany
-
-
Schmidt, A.D.1
Bye, R.2
Schmidt, H.G.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.A.6
Camtepe, S.A.7
Albayrak, S.8
-
16
-
-
84874080269
-
Mining permission request patterns from Android and facebook applications
-
Brussels, Belgium
-
M. Frank, B. Dong, A. P. Felt, and D. Song, Mining permission request patterns from Android and facebook applications, in Proc. 12th IEEE International Conference on Data Mining, Brussels, Belgium, 2012, pp. 870-875.
-
(2012)
Proc. 12th IEEE International Conference on Data Mining
, pp. 870-875
-
-
Frank, M.1
Dong, B.2
Felt, A.P.3
Song, D.4
-
17
-
-
79951646815
-
Automated static code analysis for classifying Android applications using machine learning
-
Nanning, China, December
-
A. Shabtai, Y. Fledel, and Y. Elovici, Automated static code analysis for classifying Android applications using machine learning, in Proc. 6th IEEE International Conference on Computational Intelligence and Security (CIS), Nanning, China, December, 2010, pp. 329-333.
-
(2010)
Proc. 6th IEEE International Conference on Computational Intelligence and Security (CIS)
, pp. 329-333
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
18
-
-
84860674786
-
On the automatic categorisation of Android applications
-
Las Vegas, Nevada, USA, January
-
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, and P. G. Bringas, On the automatic categorisation of Android applications, in Proc. 9th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, January, 2012, pp. 149-153.
-
(2012)
Proc. 9th IEEE Consumer Communications and Networking Conference (CCNC)
, pp. 149-153
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Bringas, P.G.5
-
19
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party Android marketplaces
-
San Antonio, TX, USA, February
-
W. Zhou, Y. Zhou, Y. Jiang, and P. Ning, Detecting repackaged smartphone applications in third-party Android marketplaces, in Proc. 2nd ACM conference on Data and Application Security and Privacy, San Antonio, TX, USA, February, 2012, pp. 317-326.
-
(2012)
Proc. 2nd ACM Conference on Data and Application Security and Privacy
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, Y.3
Ning, P.4
-
20
-
-
84876261368
-
Cloud computing-based forensic analysis for collaborative network security management system
-
Z. Chen, F. Y. Han, J. W. Cao, X. Jiang, and S. Chen, Cloud computing-based forensic analysis for collaborative network security management system, Tsinghua Science and Technology, vol. 18, no. 1, pp. 40-50, 2013.
-
(2013)
Tsinghua Science and Technology
, vol.18
, Issue.1
, pp. 40-50
-
-
Chen, Z.1
Han, F.Y.2
Cao, J.W.3
Jiang, X.4
Chen, S.5
-
21
-
-
80053019503
-
LARX: Large-scale Anti-phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform
-
Maui, Hawaii, USA
-
T. Li, F. Han, S. Ding, and Z. Chen, LARX: Large-scale Anti-phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform, in Proc. 20th International Conference on. IEEE. Computer Communications and Networks (ICCCN), Maui, Hawaii, USA, 2011, pp. 1-5.
-
(2011)
Proc. 20th International Conference On. IEEE. Computer Communications and Networks (ICCCN)
, pp. 1-5
-
-
Li, T.1
Han, F.2
Ding, S.3
Chen, Z.4
-
22
-
-
84897680298
-
-
and http://www.napp-it.org, June, 2013
-
IPSAN storage, Openindianna + napit, http:// openindiana.org/ and http://www.napp-it.org, June, 2013.
-
IPSAN Storage, Openindianna + Napit
-
-
-
23
-
-
84897680299
-
-
June
-
Cloudstack project, http://cloudstack.apache.org, June, 2013.
-
(2013)
Cloudstack Project
-
-
-
24
-
-
84897680300
-
-
June
-
ASEF project, https://code.google.com/p/asef/, June 2013.
-
(2013)
ASEF Project
-
-
-
25
-
-
84897728192
-
-
June
-
Google Safe Browsing API v2, http://code.google.com/ apis/safebrowsing/, June, 2013.
-
(2013)
Google Safe Browsing API v2
-
-
-
26
-
-
84897732656
-
-
June
-
SAAF project, https://code.google.com/p/saaf/, June, 2013.
-
(2013)
SAAF Project
-
-
-
27
-
-
84897735502
-
-
June
-
Readelf, http://sourceware.org/binutils/docs/binutils/readelf. html, June, 2013.
-
(2013)
Readelf
-
-
-
28
-
-
84897732657
-
-
June
-
Ded, http://siis.cse.psu.edu/ded/, June, 2013.
-
(2013)
Ded
-
-
-
29
-
-
84897715804
-
-
June
-
Apktool, https://code.google.com/p/Android-apktool/, June, 2013.
-
(2013)
Apktool
-
-
-
30
-
-
84890041396
-
-
June
-
Androguard, https://code.google.com/p/androguard/, June, 2013.
-
(2013)
Androguard
-
-
-
31
-
-
84897676172
-
-
June
-
Soot, http://www.sable.mcgill.ca/soot/, June, 2013.
-
(2013)
Soot
-
-
-
32
-
-
84897676337
-
-
June
-
Strace, https://zh.wikipedia.org/wiki/Strace, June, 2013.
-
(2013)
Strace
-
-
-
33
-
-
84897675141
-
-
June
-
Randoop, https://code.google.com/p/randoop/, June, 2013.
-
(2013)
Randoop
-
-
|