-
1
-
-
84906992684
-
-
[Online; accessed 29-September-2013]
-
Android Devices Statistics. http://news.cnet.com/8301-1035 3-57510994-94/google-500-million-android-devices-activated/. [Online; accessed 29-September-2013].
-
Android Devices Statistics.
-
-
-
2
-
-
84888358953
-
-
[Online; accessed 29-September-2013]
-
Kaspersky security bulletin 2012. http://www.securelist.com/en/analysis/ 204792255/Kaspersky Security Bulletin 2012 The overall statistics for 2012. [Online; accessed 29-September-2013].
-
(2012)
Kaspersky Security Bulletin
-
-
-
3
-
-
84906992683
-
-
F-secure report. [Online; Accessed 29-September-2013
-
F-secure report. http://thehackernews.com/2013/03/google-f-secure-can- say-that-anything.html. [Online; Accessed 29-September-2013
-
-
-
-
5
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
Mar.
-
M. Egele, T. Scholte, E. Kirda, and C. Kruegel, "A survey on automated dynamic malware-analysis techniques and tools," ACM Comput. Surv., no. 2, pp. 6:1-6:42, Mar. 2008. [Online]. Available: http://doi.acm.org/ 10.1145/2089125.2089126
-
(2008)
ACM Comput. Surv.
, Issue.2
, pp. 61-642
-
-
Egele, M.1
Scholte, T.2
Kirda, E.3
Kruegel, C.4
-
6
-
-
84906992682
-
-
[Online; accessed 29-September-2013]
-
Dalvik bytecode obfuscation on Android. http://dexlabs.org/blog/bytecode- obfuscation. [Online; accessed 29-September-2013].
-
Dalvik Bytecode Obfuscation on Android
-
-
-
7
-
-
74549138307
-
N-grams-based file signatures for malware detection
-
I. Santos, Y. Penya, J. Devesa, and P. Bringas, "N-grams-based file signatures for malware detection," in Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS), Volume AIDSS, 2009, pp. 317-320.
-
(2009)
Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS)
, vol.AIDSS
, pp. 317-320
-
-
Santos, I.1
Penya, Y.2
Devesa, J.3
Bringas, P.4
-
8
-
-
58849157332
-
Unknown malcode detection using opcode representation
-
R. Moskovitch, C. Feher, N. Tzachar, E. Berger, M. Gitelman, S. Dolev, and Y. Elovici, "Unknown malcode detection using opcode representation," Intelligence and Security Informatics, pp. 204-215, 2008.
-
(2008)
Intelligence and Security Informatics
, pp. 204-215
-
-
Moskovitch, R.1
Feher, C.2
Tzachar, N.3
Berger, E.4
Gitelman, M.5
Dolev, S.6
Elovici, Y.7
-
10
-
-
77949503891
-
-
The Institute of Electrical and Electronics Engineers, Inc
-
I. Santos, F. Brezo, J. Nieves, J. K Penya, B. Sanz, C. Laorden, and P. G Bringas, Opcode-sequence-based Malware Detection. The Institute of Electrical and Electronics Engineers, Inc, 2010, vol. 5965, pp. 35-43.
-
(2010)
Opcode-sequence-based Malware Detection
, vol.5965
, pp. 35-43
-
-
Santos, I.1
Brezo, F.2
Nieves, J.3
Penya, J.K.4
Sanz, B.5
Laorden, C.6
Bringas, P.G.7
-
11
-
-
84861726546
-
Opcode sequences as representation of executables for datamining-based unknown malware detection
-
I. Santos, F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas, "Opcode sequences as representation of executables for datamining-based unknown malware detection," Information Sciences, 2011. [Online]. Available: http://linkinghub.elsevier.com/retrieve/pii/S0020025511004336
-
(2011)
Information Sciences
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
12
-
-
79958239902
-
-
I. Santos, B. Sanz, C. Laorden, F. Brezo, and P. G. Bringas, Opcodesequence-based Semi-supervised Unknown Malware Detection, 2011, vol. 6694, pp. 50-57.
-
(2011)
Opcodesequence-based Semi-supervised Unknown Malware Detection
, vol.6694
, pp. 50-57
-
-
Santos, I.1
Sanz, B.2
Laorden, C.3
Brezo, F.4
Bringas, P.G.5
-
13
-
-
84868259476
-
Droidmat: Android malware detection through manifest and api calls tracing
-
D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, "Droidmat: Android malware detection through manifest and api calls tracing," in Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on. IEEE, 2012, pp. 62-69.
-
(2012)
Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference On. IEEE
, pp. 62-69
-
-
Wu, D.-J.1
Mao, C.-H.2
Wei, T.-E.3
Lee, H.-M.4
Wu, K.-P.5
-
15
-
-
33745830801
-
-
[Online; accessed 29-September-2013]
-
C5.0 Machine Learning Algorithm. http://www.rulequest.com/see5-info.html. [Online; accessed 29-September-2013].
-
C5.0 Machine Learning Algorithm
-
-
-
16
-
-
50949133669
-
Liblinear: A library for large linear classification
-
R. Fan, K. Chang, C. Hsieh, X. Wang, and C. Lin, "Liblinear: A library for large linear classification," The Journal of Machine Learning Research, pp. 1871-1874, 2008.
-
(2008)
The Journal of Machine Learning Research
, pp. 1871-1874
-
-
Fan, R.1
Chang, K.2
Hsieh, C.3
Wang, X.4
Lin, C.5
-
17
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets," of the 19th Annual Network and, no. 2, 2012. [Online]. Available: http://www.csd.uoc.gr/?hy558/papers/mal apps.pdf
-
(2012)
19th Annual Network and
, Issue.2
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
18
-
-
84906992680
-
-
[Online; accessed 29-September-2013]
-
Virustotal. https://www.virustotal.com. [Online; accessed 29-September-2013].
-
-
-
-
19
-
-
84888999727
-
-
S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song, "Juxtapp: A scalable system for detecting code reuse among android applications."
-
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
20
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
New York, NY, USA: ACM
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "Detecting repackaged smartphone applications in third-party android marketplaces," in Proceedings of the second ACM conference on Data and Application Security and Privacy, ser. CODASPY '12. New York, NY, USA: ACM, 2012, pp. 317-326. [Online]. Available: http://doi.acm.org/10. 1145/2133601.2133640
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, Ser. CODASPY '12
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
21
-
-
80755181021
-
A survey of mobile malware in the wild
-
New York, NY, USA: ACM
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 3-14. [Online]. Available: http://doi.acm.org.proxy. bnl.lu/10.1145/2046614.2046618
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Ser. SPSM '11
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
22
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Washington, DC, USA: IEEE Computer Society
-
Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 95-109. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.16
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, Ser. SP '12
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
23
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, "Andromaly: A behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, no. 1, pp. 161-190, 2011. [Online]. Available: http://www.springerlink.com/index/10. 1007/s10844-010-0148-x
-
(2011)
Journal of Intelligent Information Systems
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
24
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
New York, NY, USA: ACM
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "Riskranker: Scalable and accurate zero-day android malware detection," in Proceedings of the 10th international conference on Mobile systems, applications, and services, ser. MobiSys '12. New York, NY, USA: ACM, 2012, pp. 281-294. [Online]. Available: http://doi.acm.org. proxy.bnl.lu/10.1145/2307636.2307663
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Ser. MobiSys '12
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
26
-
-
84855822423
-
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications
-
L. Batyuk, M. Herpich, S. A. Camtepe, K. Raddatz, A.-D. Schmidt, and S. Albayrak, "Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications," Malicious and Unwanted Software, International Conference on, pp. 66-72, 2011.
-
(2011)
Malicious and Unwanted Software, International Conference on
, pp. 66-72
-
-
Batyuk, L.1
Herpich, M.2
Camtepe, S.A.3
Raddatz, K.4
Schmidt, A.-D.5
Albayrak, S.6
-
27
-
-
80755143401
-
Crowdroid: Behaviorbased malware detection system for android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: behaviorbased malware detection system for android," Science, pp. 15-25, 2011. [Online]. Available: http://dl.acm.org/citation.cfm?id=2046619
-
(2011)
Science
, pp. 15-25
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
28
-
-
84868120043
-
Walldroid: Cloud assisted virtualized application specific firewalls for the android os
-
C. Kilinc, T. Booth, and K. Andersson, "Walldroid: Cloud assisted virtualized application specific firewalls for the android os," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012, pp. 877-883.
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference On. IEEE
, pp. 877-883
-
-
Kilinc, C.1
Booth, T.2
Andersson, K.3
-
29
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
New York, NY, USA: ACM
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, "Unsafe exposure analysis of mobile in-app advertisements," in Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, ser. WISEC '12. New York, NY, USA: ACM, 2012, pp. 101-112. [Online]. Available: http://doi.acm.org.proxy.bnl.lu/10.1145/2185448.2185464
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Ser. WISEC '12
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
30
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in android
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner, "Addroid: Privilege separation for applications and advertisers in android," in Proceedings of AsiaCCS, 2012.
-
(2012)
Proceedings of AsiaCCS
-
-
Pearce, P.1
Felt, A.P.2
Nunez, G.3
Wagner, D.4
-
31
-
-
84906991194
-
-
Rheinische Friedrich-Wilhelms-Universität Bonn, Germany, Tech. Rep.
-
S. Patrick, "Code protection in android," Rheinische Friedrich-Wilhelms-Universität Bonn, Germany, Tech. Rep., 2012.
-
(2012)
Code Protection in Android
-
-
Patrick, S.1
-
32
-
-
84875665845
-
ADAM: An automatic and extensible platform to stress test Android anti-virus systems
-
Springer
-
M. Zheng, P. P. Lee, and J. C. Lui, "ADAM: An automatic and extensible platform to stress test Android anti-virus systems," in Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2013, pp. 82-101.
-
(2013)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 82-101
-
-
Zheng, M.1
Lee, P.P.2
Lui, J.C.3
|