-
1
-
-
84904101921
-
-
Anubis, http://anubis.iseclab.org
-
-
-
-
2
-
-
84904119615
-
-
VirusShare, http://www.virusshare.com
-
-
-
-
3
-
-
84904104327
-
-
VirusTotal, http://www.virustotal.com
-
-
-
-
4
-
-
84869797921
-
Understanding and Improving App Installation Security Mechanisms Through Empirical Analysis of Android
-
Barrera, D., Clark, J., McCarney, D., van Oorschot, P.C.: Understanding and Improving App Installation Security Mechanisms Through Empirical Analysis of Android. In: Proceedings of the 2nd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM (2012)
-
Proceedings of the 2nd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM (2012)
-
-
Barrera, D.1
Clark, J.2
McCarney, D.3
Van Oorschot, P.C.4
-
5
-
-
84879543890
-
MAST: Triage for Market-scale Mobile Malware Analysis
-
Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: MAST: Triage for Market-scale Mobile Malware Analysis. In: Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec (2013)
-
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec (2013)
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
7
-
-
84865590234
-
Attack of the Clones: Detecting Cloned Applications on Android Markets
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
-
Crussell, J., Gibler, C., Chen, H.: Attack of the Clones: Detecting Cloned Applications on Android Markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37-54. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7459
, pp. 37-54
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
9
-
-
85025700509
-
A Study of Android Application Security
-
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application Security. In: Proceedings of the 20th USENIX Security Symposium (2011)
-
Proceedings of the 20th USENIX Security Symposium (2011)
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
10
-
-
84904098536
-
-
March
-
F-Secure: Threat Report H2 2013. (March 2014), http://www.f-secure.com/ static/doc/labs-global/Research/Threa-Report-H2-2013.pdf
-
(2014)
Threat Report H2 2013
-
-
-
11
-
-
84881131952
-
AdRob: Examining the Landscape and Impact of Android Application Plagiarism
-
Gibler, C., Stevens, R., Crussell, J., Chen, H., Zang, H., Choi, H.: AdRob: Examining the Landscape and Impact of Android Application Plagiarism. In: Proceedings of 11th International Conference on Mobile Systems, Applications and Services, MobiSys (2013)
-
Proceedings of 11th International Conference on Mobile Systems, Applications and Services, MobiSys (2013)
-
-
Gibler, C.1
Stevens, R.2
Crussell, J.3
Chen, H.4
Zang, H.5
Choi, H.6
-
12
-
-
84864334986
-
RiskRanker: Scalable and Accurate Zero-day AndroidMalware Detection
-
Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: RiskRanker: Scalable and Accurate Zero-day AndroidMalware Detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys (2012)
-
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys (2012)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
13
-
-
84904123555
-
-
Tech. rep., March
-
Gu, L.: The Mobile Cybercriminal Underground Market in China. Tech. rep., Trend Micro (March 2014), http://www.trendmicro.com/cloud-content/us/pdfs/ security-intelligence/white-papers/wp-the-mobile-cybercriminal-underground- market-in-china.pdf
-
(2014)
The Mobile Cybercriminal Underground Market in China
-
-
Gu, L.1
-
14
-
-
84875649563
-
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications
-
Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. Springer, Heidelberg
-
Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 62-81. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7591
, pp. 62-81
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
16
-
-
84951915648
-
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers
-
Lever, C., Antonakakis, M., Reaves, B., Traynor, P., Lee, W.: The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. In: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS (2013)
-
Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS (2013)
-
-
Lever, C.1
Antonakakis, M.2
Reaves, B.3
Traynor, P.4
Lee, W.5
-
18
-
-
84889030716
-
AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors
-
Maggi, F., Valdi, A., Zanero, S.: AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors. In: Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM (2013)
-
Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM (2013)
-
-
Maggi, F.1
Valdi, A.2
Zanero, S.3
-
19
-
-
84855746345
-
-
August
-
McAfee Labs: McAfee Threats Report: Second Quarter (August 2013), http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2013.pdf
-
(2013)
McAfee Threats Report: Second Quarter
-
-
-
21
-
-
84890079313
-
Rise of the Planet of the Apps: A Systematic Study of the Mobile App Ecosystem
-
Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., Karagiannis, T.: Rise of the Planet of the Apps: A Systematic Study of the Mobile App Ecosystem. In: Proceedings of the 2013 Conference on Internet Measurement Conference, IMC (2013)
-
Proceedings of the 2013 Conference on Internet Measurement Conference, IMC (2013)
-
-
Petsas, T.1
Papadogiannakis, A.2
Polychronakis, M.3
Markatos, E.P.4
Karagiannis, T.5
-
22
-
-
84904116168
-
Similarities for Fun & Profit
-
Pouik, Gorfi3ld: Similarities for Fun & Profit. Phrack Magazine 14(68) (2012)
-
(2012)
Phrack Magazine
, vol.14
, Issue.68
-
-
Pouik1
Gorfild2
-
23
-
-
84878002579
-
DroidChameleon: Evaluating Android Antimalware Against Transformation Attacks
-
Rastogi, V., Chen, Y., Jiang, X.: DroidChameleon: Evaluating Android Antimalware Against Transformation Attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIACCS (2013)
-
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIACCS (2013)
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
25
-
-
84904102397
-
-
Signals and Systems Telecom: Tech. rep. September
-
Signals and Systems Telecom: The Mobile Device & Network Security Bible: 2013-2020. Tech. rep. (September 2013), http://www.reportsnreports.com/ reports/267722-the-mobile-device-network-security-bible-2013-2020.html
-
(2013)
The Mobile Device & Network Security Bible: 2013-2020
-
-
-
27
-
-
84904132120
-
-
August
-
Trend Micro: TrendLabs 2Q 2013 Security Roundup. (August 2013), http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/ rpt-2q-2013-trendlabs-security-roundup.pdf
-
(2013)
TrendLabs 2Q 2013 Security Roundup
-
-
-
28
-
-
84904125204
-
-
Tech. rep., Symantec October
-
Uscilowski, B.: Mobile Adware and Malware Analysis. Tech. rep., Symantec (October 2013), http://www.symantec.com/content/en/us/enterprise/media/security- response/whitepapers/madware-and-malware-analysis.pdf
-
(2013)
Mobile Adware and Malware Analysis
-
-
Uscilowski, B.1
-
30
-
-
84904090498
-
-
Tech. Rep. TR-ISECLAB-0414-001, Vienna University of Technology
-
Weichselbaum, L., Neugschwandtner, M., Lindorfer, M., Fratantonio, Y., van der Veen, V., Platzer, C.: Andrubis: Android Malware Under The Magnifying Glass. Tech. Rep. TR-ISECLAB-0414-001, Vienna University of Technology (2014)
-
(2014)
Andrubis: Android Malware under the Magnifying Glass
-
-
Weichselbaum, L.1
Neugschwandtner, M.2
Lindorfer, M.3
Fratantonio, Y.4
Van Der Veen, V.5
Platzer, C.6
-
31
-
-
84904133860
-
-
November
-
Zhang, Y., Xue, H., Wei, T., Song, D.: Monitoring Vulnaggressive Apps on Google Play (November 2013), http://www.fireeye.com/blog/technical/2013/11/ monitoring-vulnaggressive-apps-on-google-play.html
-
(2013)
Monitoring Vulnaggressive Apps on Google Play
-
-
Zhang, Y.1
Xue, H.2
Wei, T.3
Song, D.4
-
32
-
-
84875665845
-
ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems
-
Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. Springer, Heidelberg
-
Zheng, M., Lee, P.P.C., Lui, J.C.S.: ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 82-101. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7591
, pp. 82-101
-
-
Zheng, M.1
Lee, P.P.C.2
Lui, J.C.S.3
-
33
-
-
84874828789
-
Fast, Scalable Detection of "Piggybacked" Mobile Applications
-
Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, Scalable Detection of "Piggybacked" Mobile Applications. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, CODASPY (2013)
-
Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, CODASPY (2013)
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
34
-
-
85137132511
-
Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY (2012)
-
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY (2012)
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
36
-
-
85172622386
-
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium, NDSS (2012)
-
Proceedings of the 19th Annual Network & Distributed System Security Symposium, NDSS (2012)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|