메뉴 건너뛰기




Volumn , Issue , 2014, Pages 914-919

Using opcode-sequences to detect malicious Android applications

Author keywords

Android malware; machine learning; opcode sequences

Indexed keywords

APPLICATION PROGRAMS; ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; LEARNING SYSTEMS; MALWARE;

EID: 84906994678     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2014.6883436     Document Type: Conference Paper
Times cited : (77)

References (32)
  • 1
    • 84906992684 scopus 로고    scopus 로고
    • [Online; accessed 29-September-2013]
    • Android Devices Statistics. http://news.cnet.com/8301-1035 3-57510994-94/google-500-million-android-devices-activated/. [Online; accessed 29-September-2013].
    • Android Devices Statistics.
  • 2
    • 84888358953 scopus 로고    scopus 로고
    • [Online; accessed 29-September-2013]
    • Kaspersky security bulletin 2012. http://www.securelist.com/en/analysis/ 204792255/Kaspersky Security Bulletin 2012 The overall statistics for 2012. [Online; accessed 29-September-2013].
    • (2012) Kaspersky Security Bulletin
  • 3
    • 84906992683 scopus 로고    scopus 로고
    • F-secure report. [Online; Accessed 29-September-2013
    • F-secure report. http://thehackernews.com/2013/03/google-f-secure-can- say-that-anything.html. [Online; Accessed 29-September-2013
  • 4
    • 84878724863 scopus 로고    scopus 로고
    • Dissecting the android bouncer
    • New York
    • J. Oberheide and C. Miller, "Dissecting the android bouncer," Summer-Con2012, New York, 2012.
    • (2012) Summer-Con2012
    • Oberheide, J.1    Miller, C.2
  • 5
    • 84858392040 scopus 로고    scopus 로고
    • A survey on automated dynamic malware-analysis techniques and tools
    • Mar.
    • M. Egele, T. Scholte, E. Kirda, and C. Kruegel, "A survey on automated dynamic malware-analysis techniques and tools," ACM Comput. Surv., no. 2, pp. 6:1-6:42, Mar. 2008. [Online]. Available: http://doi.acm.org/ 10.1145/2089125.2089126
    • (2008) ACM Comput. Surv. , Issue.2 , pp. 61-642
    • Egele, M.1    Scholte, T.2    Kirda, E.3    Kruegel, C.4
  • 6
    • 84906992682 scopus 로고    scopus 로고
    • [Online; accessed 29-September-2013]
    • Dalvik bytecode obfuscation on Android. http://dexlabs.org/blog/bytecode- obfuscation. [Online; accessed 29-September-2013].
    • Dalvik Bytecode Obfuscation on Android
  • 11
    • 84861726546 scopus 로고    scopus 로고
    • Opcode sequences as representation of executables for datamining-based unknown malware detection
    • I. Santos, F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas, "Opcode sequences as representation of executables for datamining-based unknown malware detection," Information Sciences, 2011. [Online]. Available: http://linkinghub.elsevier.com/retrieve/pii/S0020025511004336
    • (2011) Information Sciences
    • Santos, I.1    Brezo, F.2    Ugarte-Pedrero, X.3    Bringas, P.G.4
  • 15
    • 33745830801 scopus 로고    scopus 로고
    • [Online; accessed 29-September-2013]
    • C5.0 Machine Learning Algorithm. http://www.rulequest.com/see5-info.html. [Online; accessed 29-September-2013].
    • C5.0 Machine Learning Algorithm
  • 17
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets," of the 19th Annual Network and, no. 2, 2012. [Online]. Available: http://www.csd.uoc.gr/?hy558/papers/mal apps.pdf
    • (2012) 19th Annual Network and , Issue.2
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4
  • 18
    • 84906992680 scopus 로고    scopus 로고
    • [Online; accessed 29-September-2013]
    • Virustotal. https://www.virustotal.com. [Online; accessed 29-September-2013].
  • 22
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Washington, DC, USA: IEEE Computer Society
    • Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 95-109. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.16
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy, Ser. SP '12 , pp. 95-109
    • Zhou, Y.1    Jiang, X.2
  • 23
    • 84856225193 scopus 로고    scopus 로고
    • Andromaly: A behavioral malware detection framework for android devices
    • A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, "Andromaly: A behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, no. 1, pp. 161-190, 2011. [Online]. Available: http://www.springerlink.com/index/10. 1007/s10844-010-0148-x
    • (2011) Journal of Intelligent Information Systems , Issue.1 , pp. 161-190
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3    Glezer, C.4    Weiss, Y.5
  • 27
    • 80755143401 scopus 로고    scopus 로고
    • Crowdroid: Behaviorbased malware detection system for android
    • I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: behaviorbased malware detection system for android," Science, pp. 15-25, 2011. [Online]. Available: http://dl.acm.org/citation.cfm?id=2046619
    • (2011) Science , pp. 15-25
    • Burguera, I.1    Zurutuza, U.2    Nadjm-Tehrani, S.3
  • 30
    • 84871959049 scopus 로고    scopus 로고
    • Addroid: Privilege separation for applications and advertisers in android
    • P. Pearce, A. P. Felt, G. Nunez, and D. Wagner, "Addroid: Privilege separation for applications and advertisers in android," in Proceedings of AsiaCCS, 2012.
    • (2012) Proceedings of AsiaCCS
    • Pearce, P.1    Felt, A.P.2    Nunez, G.3    Wagner, D.4
  • 31
    • 84906991194 scopus 로고    scopus 로고
    • Rheinische Friedrich-Wilhelms-Universität Bonn, Germany, Tech. Rep.
    • S. Patrick, "Code protection in android," Rheinische Friedrich-Wilhelms-Universität Bonn, Germany, Tech. Rep., 2012.
    • (2012) Code Protection in Android
    • Patrick, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.