-
1
-
-
84906506524
-
-
Juniper: 2013 mobile threats report. Technical report, Juniper Networks (2013)
-
Juniper: 2013 mobile threats report. Technical report, Juniper Networks (2013)
-
-
-
-
2
-
-
84903188119
-
Evolution, detection and analysis of malware for smart devices
-
Suarez-Tangil, G., Tapiador, J.E., Peris, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Communications Surveys & Tutorials PP(99), 1-27 (2013)
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.99
, pp. 1-27
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris, P.3
Ribagorda, A.4
-
3
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM, New York
-
Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 3-14. ACM, New York (2011)
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
5
-
-
84877985630
-
Sensing-enabled channels for hard-to-detect command and control of mobile devices
-
ACM
-
Hasan, R., Saxena, N., Haleviz, T., Zawoad, S., Rinehart, D.: Sensing-enabled channels for hard-to-detect command and control of mobile devices. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 469-480. ACM (2013)
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 469-480
-
-
Hasan, R.1
Saxena, N.2
Haleviz, T.3
Zawoad, S.4
Rinehart, D.5
-
6
-
-
84959317411
-
-
Technical report, Kaspersky
-
Raiu, C., Emm, D.: Kaspersky security bulletin. Technical report, Kaspersky (2013), http://media.kaspersky.com/pdf/KSB-2013-EN.pdf
-
(2013)
Kaspersky Security Bulletin
-
-
Raiu, C.1
Emm, D.2
-
7
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
Langner, R.: Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 9(3), 49-51 (2011)
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
8
-
-
84897768316
-
-
Technical report, Symantex
-
Corporation, S.: Internet security threat report. Technical report, Symantex (2013), http://www.symantec.com/content/en/us/enterprise/other resources/b-istr main report v18 2012 21291018.en-us.pdf
-
(2013)
Internet Security Threat Report
-
-
Corporation, S.1
-
10
-
-
84911875218
-
-
Research Brief (March
-
Marquis-Boire, M., Marczak, B., Guarnieri, C., Scott-Railton, J.: You only click twice: Finfishers global proliferation. Research Brief (March 2013), https://citizenlab.org/wp-content/uploads/2013/07/15-2013-youonlyclicktwice.pdf
-
(2013)
You only Click Twice: Finfishers Global Proliferation
-
-
Marquis-Boire, M.1
Marczak, B.2
Guarnieri, C.3
Scott-Railton, J.4
-
12
-
-
84898404241
-
Context variability for context-aware systems
-
Capilla, R., Ortiz, O., Hinchey, M.: Context variability for context-aware systems. Computer 47(2), 85-87 (2014)
-
(2014)
Computer
, vol.47
, Issue.2
, pp. 85-87
-
-
Capilla, R.1
Ortiz, O.2
Hinchey, M.3
-
13
-
-
84906496866
-
-
arXiv preprint arXiv:1402.4826
-
Gianazza, A., Maggi, F., Fattori, A., Cavallaro, L., Zanero, S.: Puppetdroid: A usercentric ui exerciser for automatic dynamic analysis of similar android applications. arXiv preprint arXiv:1402.4826 (2014)
-
(2014)
Puppetdroid: A Usercentric Ui Exerciser for Automatic Dynamic Analysis of Similar Android Applications
-
-
Gianazza, A.1
Maggi, F.2
Fattori, A.3
Cavallaro, L.4
Zanero, S.5
-
14
-
-
84879543890
-
Mast: Triage for market-scale mobile malware analysis
-
ACM, New York
-
Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: Mast: Triage for market-scale mobile malware analysis. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 13-24. ACM, New York (2013)
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013
, pp. 13-24
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
15
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1-6. USENIX Association (2010)
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
16
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 347-356 (2010)
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
17
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
Chun, B.G., Ihm, S., Maniatis, P., Naik, M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems, pp. 301-314 (2011)
-
(2011)
Proceedings of the Sixth Conference on Computer Systems
, pp. 301-314
-
-
Chun, B.G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
18
-
-
84861596582
-
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
-
IEEE
-
Kosta, S., Aucinas, A., Hui, P., Mortier, R., Zhang, X.: Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In: 2012 Proceedings IEEE INFOCOM, pp. 945-953. IEEE (2012)
-
(2012)
2012 Proceedings IEEE INFOCOM
, pp. 945-953
-
-
Kosta, S.1
Aucinas, A.2
Hui, P.3
Mortier, R.4
Zhang, X.5
-
19
-
-
85046801478
-
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
-
Zonouz, S., Houmansadr, A., Berthier, R., Borisov, N., Sanders, W.: Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Computers & Security (2013)
-
(2013)
Computers & Security
-
-
Zonouz, S.1
Houmansadr, A.2
Berthier, R.3
Borisov, N.4
Sanders, W.5
-
20
-
-
84892404107
-
Pytrigger: A system to trigger & extract user-activated malware behavior
-
IEEE
-
Fleck, D., Tokhtabayev, A., Alarif, A., Stavrou, A., Nykodym, T.: Pytrigger: A system to trigger & extract user-activated malware behavior. In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 92-101. IEEE (2013)
-
(2013)
2013 Eighth International Conference on Availability, Reliability and Security (ARES)
, pp. 92-101
-
-
Fleck, D.1
Tokhtabayev, A.2
Alarif, A.3
Stavrou, A.4
Nykodym, T.5
-
21
-
-
84869757378
-
Smartdroid: An automatic system for revealing UI-based trigger conditions in Android applications
-
ACM, New York
-
Zheng, C., Zhu, S., Dai, S., Gu, G., Gong, X., Han, X., Zou, W.: Smartdroid: an automatic system for revealing UI-based trigger conditions in Android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012, pp. 93-104. ACM, New York (2012)
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012
, pp. 93-104
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Han, X.6
Zou, W.7
-
22
-
-
84874865861
-
Appsplayground: Automatic security analysis of smartphone applications
-
ACM, New York
-
Rastogi, V., Chen, Y., Enck, W.: Appsplayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, pp. 209-220. ACM, New York (2013)
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
23
-
-
84881281565
-
Automated testing with targeted event sequence generation
-
ACM
-
Jensen, C.S., Prasad, M.R., Møller, A.: Automated testing with targeted event sequence generation. In: Proceedings of the 2013 International Symposium on Software Testing and Analysis, pp. 67-77. ACM (2013)
-
(2013)
Proceedings of the 2013 International Symposium on Software Testing and Analysis
, pp. 67-77
-
-
Jensen, C.S.1
Prasad, M.R.2
Møller, A.3
-
24
-
-
84906496867
-
-
Liang, C.J.M., Lane, N.D., Brouwers, N., Zhang, L., Karlsson, B., Liu, H., Liu, Y., Tang, J., Shan, X., Chandra, R., et al.: Context virtualizer: A cloud service for automated large-scale mobile app testing under real-world conditions
-
Context Virtualizer: A Cloud Service for Automated Large-scale Mobile App Testing under Real-world Conditions
-
-
Liang, C.J.M.1
Lane, N.D.2
Brouwers, N.3
Zhang, L.4
Karlsson, B.5
Liu, H.6
Liu, Y.7
Tang, J.8
Shan, X.9
Chandra, R.10
-
25
-
-
84883731598
-
Dynodroid: An input generation system for android apps
-
ACM, New York
-
Machiry, A., Tahiliani, R., Naik, M.: Dynodroid: An input generation system for android apps. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, pp. 224-234. ACM, New York (2013)
-
(2013)
Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013
, pp. 224-234
-
-
Machiry, A.1
Tahiliani, R.2
Naik, M.3
-
26
-
-
84930525327
-
A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors
-
Prague, Czech Republic (April
-
Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In: Proceedings of the 6th European Workshop on System Security (EUROSEC), Prague, Czech Republic (April 2013)
-
(2013)
Proceedings of the 6th European Workshop on System Security (EUROSEC)
-
-
Reina, A.1
Fattori, A.2
Cavallaro, L.3
-
27
-
-
84866302360
-
Crepe: A system for enforcing fine-grained context-related policies on android
-
Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: Crepe: A system for enforcing fine-grained context-related policies on android. IEEE Transactions on Information Forensics and Security 7(5), 1426-1438 (2012)
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.5
, pp. 1426-1438
-
-
Conti, M.1
Crispo, B.2
Fernandes, E.3
Zhauniarovich, Y.4
-
28
-
-
0003781238
-
-
Number 2008. Cambridge University Press
-
Norris, J.R.: Markov chains. Number 2008. Cambridge University Press (1998)
-
(1998)
Markov Chains
-
-
Norris, J.R.1
-
29
-
-
84906515669
-
Thwarting obfuscated malware via differential fault analysis
-
June
-
Suarez-Tangil, G., Lobardi, F., Tapiador, J.E., Pietro, R.D.: Thwarting obfuscated malware via differential fault analysis. IEEE Computer (June 2014)
-
(2014)
IEEE Computer
-
-
Suarez-Tangil, G.1
Lobardi, F.2
Tapiador, J.E.3
Pietro, R.D.4
-
30
-
-
84906487534
-
-
Android: Android developers (visited December 2013)
-
Android: Android developers (visited December 2013), http://developer. android.com/
-
-
-
-
32
-
-
65549085067
-
Power-law distributions in empirical data
-
Clauset, A., Shalizi, C.R., Newman, M.E.: Power-law distributions in empirical data. SIAM Review 51(4), 661-703 (2009)
-
(2009)
SIAM Review
, vol.51
, Issue.4
, pp. 661-703
-
-
Clauset, A.1
Shalizi, C.R.2
Newman, M.E.3
-
33
-
-
84866608644
-
Profiledroid: Multi-layer profiling of android applications
-
ACM, New York
-
Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Profiledroid: Multi-layer profiling of android applications. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Mobicom 2012, pp. 137-148. ACM, New York (2012)
-
(2012)
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Mobicom 2012
, pp. 137-148
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
34
-
-
0036013593
-
Statistical mechanics of complex networks
-
Albert, R., Barabasi, A.L.: Statistical mechanics of complex networks. Reviews of Modern Physics 74(1), 47 (2002)
-
(2002)
Reviews of Modern Physics
, vol.74
, Issue.1
, pp. 47
-
-
Albert, R.1
Barabasi, A.L.2
-
36
-
-
84906496865
-
-
visited December
-
Bertrand, A., David, R., Akimov, A., Junk, P.: Remote administration tool for android devices (visited December 2013), https://github.com/ DesignativeDave/androrat
-
(2013)
Remote Administration Tool for Android Devices
-
-
Bertrand, A.1
David, R.2
Akimov, A.3
Junk, P.4
-
37
-
-
84874828789
-
Fast, scalable detection of piggybacked mobile applications
-
ACM
-
Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of piggybacked mobile applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 185-196. ACM (2013)
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy
, pp. 185-196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
|