-
2
-
-
84878001173
-
Mobile-sandbox: Having a deeper look into Android applications
-
New York, NY, USA: ACM
-
M. Spreitzenbarth, F. C. Freiling, F. Echtler, T. Schreck, and J. Hoffmann, "Mobile-sandbox: Having a deeper look into Android applications," in Proceedings of the 28th Annual ACM Symposium on Applied Computing, ser. SAC '13. New York, NY, USA: ACM, 2013, pp. 1808-1815.
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing, Ser. SAC '13
, pp. 1808-1815
-
-
Spreitzenbarth, M.1
Freiling, F.C.2
Echtler, F.3
Schreck, T.4
Hoffmann, J.5
-
3
-
-
84872117493
-
Analysis of the communication between colluding applications on modern smartphones
-
New York, NY, USA: ACM, Dec.
-
C. Marforio, H. Ritzdorf, A. Francillon, and S. Capkun, "Analysis of the Communication Between Colluding Applications on Modern Smartphones," in Proceedings of the 28th Annual Computer Security Applications Conference, ser. ACSAC '12. New York, NY, USA: ACM, Dec. 2012, pp. 51-60.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference, Ser. ACSAC '12
, pp. 51-60
-
-
Marforio, C.1
Ritzdorf, H.2
Francillon, A.3
Capkun, S.4
-
4
-
-
53349116756
-
Towards an understanding of anti-virtualization and antidebugging behavior in modern malware
-
June
-
X. Chen, J. Andersen, Z. Mao, M. Bailey, and J. Nazario, "Towards an understanding of anti-virtualization and antidebugging behavior in modern malware," in Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on, June 2008, pp. 177-186.
-
(2008)
Dependable Systems and Networks with FTCS and DCC, 2008. DSN 2008. IEEE International Conference on
, pp. 177-186
-
-
Chen, X.1
Andersen, J.2
Mao, Z.3
Bailey, M.4
Nazario, J.5
-
5
-
-
77950675112
-
Google Android: A comprehensive security assessment
-
Mar.
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer, "Google Android: A comprehensive security assessment," IEEE Security and Privacy, vol. 8, no. 2, pp. 35-44, Mar. 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
6
-
-
84878002579
-
Droidchameleon: Evaluating Android anti-malware against transformation attacks
-
New York, NY, USA: ACM
-
V. Rastogi, Y. Chen, and X. Jiang, "Droidchameleon: Evaluating Android anti-malware against transformation attacks," in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ser. ASIA CCS '13. New York, NY, USA: ACM, 2013, pp. 329-334.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Ser. ASIA CCS '13
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
7
-
-
84889036292
-
On the effectiveness of malware protection on Android
-
Berlin, Tech. Rep.
-
R. Fedler, J. Schütte, and M. Kulicke, "On the effectiveness of malware protection on Android," Fraunhofer AISEC, Berlin, Tech. Rep., 2013.
-
(2013)
Fraunhofer AISEC
-
-
Fedler, R.1
Schütte, J.2
Kulicke, M.3
-
9
-
-
84920559557
-
-
Feb. Android and Security. Google Inc.
-
H. Lockheimer. (2012, Feb. ) Android and Security. Google Inc. [Online]. Available: http://googlemobile. blogspot. de/ 2012/02/android-and-security. html
-
(2012)
-
-
Lockheimer, H.1
-
10
-
-
84930154133
-
Adventures in bouncerland: Failures of automated malware detection with in mobile application markets
-
Jul.
-
N. J. Percoco and S. Schulte, "Adventures in Bouncerland: Failures of Automated Malware Detection with in Mobile Application Markets," in Black Hat USA '12. Trustwave SpiderLabs, Jul. 2012.
-
(2012)
Black Hat USA '12. Trustwave SpiderLabs
-
-
Percoco, N.J.1
Schulte, S.2
-
11
-
-
84878724863
-
Dissecting the android bouncer
-
Brooklyn, NY
-
J. Oberheide and C. Miller, "Dissecting the Android Bouncer. " Presented at SummerCon 2012, Brooklyn, NY, 2012. [Online]. Available: https://jon. oberheide. org/files/ summercon12-bouncer. pdf
-
(2012)
SummerCon 2012
-
-
Oberheide, J.1
Miller, C.2
-
12
-
-
84961583949
-
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
-
San Diego, CA, February
-
S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, and G. Vigna, "Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications," in Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.
-
(2014)
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)
-
-
Poeplau, S.1
Fratantonio, Y.2
Bianchi, A.3
Kruegel, C.4
Vigna, G.5
-
13
-
-
48649087530
-
Limits of static analysis for malware detection
-
Dec
-
A. Moser, C. Kruegel, and E. Kirda, "Limits of static analysis for malware detection," in Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, Dec 2007, pp. 421-430.
-
(2007)
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
14
-
-
84855669384
-
Barebox: Efficient malware analysis on bare-metal
-
New York, NY, USA: ACM
-
D. Kirat, G. Vigna, and C. Kruegel, "Barebox: Efficient malware analysis on bare-metal," in Proceedings of the 27th Annual Computer Security Applications Conference, ser. ACSAC '11. New York, NY, USA: ACM, 2011, pp. 403-412.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, Ser. ACSAC '11
, pp. 403-412
-
-
Kirat, D.1
Vigna, G.2
Kruegel, C.3
-
15
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
Mar.
-
C. Willems, T. Holz, and F. C. Freiling, "Toward automated dynamic malware analysis using cwsandbox," IEEE Security and Privacy, vol. 5, no. 2, pp. 32-39, Mar. 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.C.3
-
16
-
-
85084096603
-
A view on current malware behaviors
-
Berkeley, CA, USA: USENIX Association
-
U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel, "A view on current malware behaviors," in Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, ser. LEET'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 8-8.
-
(2009)
Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, Ser. LEET'09
, pp. 8-8
-
-
Bayer, U.1
Habibi, I.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
17
-
-
84873743297
-
Towards dynamic malware analysis to increase mobile device security
-
GI A. Alkassar and J. H. Siekmann, Eds.
-
M. Becher and F. C. Freiling, "Towards dynamic malware analysis to increase mobile device security," in Sicherheit, ser. LNI, A. Alkassar and J. H. Siekmann, Eds., vol. 128. GI, pp. 423-433.
-
Sicherheit, Ser. LNI
, vol.128
, pp. 423-433
-
-
Becher, M.1
Freiling, F.C.2
-
19
-
-
78651410113
-
An Android application sandbox system for suspicious software detection
-
Oct
-
T. Bläsing, L. Batyuk, A.-D. Schmidt, S. Camtepe, and S. Albayrak, "An Android application sandbox system for suspicious software detection," in Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, Oct 2010, pp. 55-62.
-
(2010)
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on
, pp. 55-62
-
-
Bläsing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.4
Albayrak, S.5
-
23
-
-
79955570859
-
Taintdroid: An informationflow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA: USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "Taintdroid: An informationflow tracking system for realtime privacy monitoring on smartphones," in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-6.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, Ser. OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
24
-
-
84920624949
-
Forsafe mobile security
-
ForSafe, "Forsafe mobile security," Whitepaper, 2013. [Online]. Available: http://www. foresafe. com/ForeSafe WhitePaper. pdf
-
(2013)
Whitepaper
-
-
-
25
-
-
84920591819
-
-
Botnet Research Team. Xi'an Jiaotong University
-
Botnet Research Team. (2014) SandDroid: An APK Analysis Sandbox. Xi'an Jiaotong University. [Online]. Available: http://sanddroid. xjtu. edu. cn
-
(2014)
SandDroid: An APK Analysis Sandbox
-
-
-
26
-
-
84920613092
-
-
Master Thesis, VU University Amsterdam, Aug.
-
V. Van der Veen, "Dynamic Analysis of Android Malware," Master Thesis, VU University Amsterdam, Aug. 2013. [Online]. Available: http://tracedroid. few. vu. nl/thesis. pdf
-
(2013)
Dynamic Analysis of Android Malware
-
-
Veen Der V.Van1
-
27
-
-
84889055128
-
Native code execution control for attack mitigation on Android
-
New York, NY, USA: ACM
-
R. Fedler, M. Kulicke, and J. Schütte, "Native code execution control for attack mitigation on Android," in Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones Mobile Devices, ser. SPSM '13. New York, NY, USA: ACM, 2013, pp. 15-20.
-
(2013)
Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones Mobile Devices, Ser. SPSM '13
, pp. 15-20
-
-
Fedler, R.1
Kulicke, M.2
Schütte, J.3
-
28
-
-
84875264064
-
Towards taming privilege-escalation attacks on android
-
Feb.
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry, "Towards Taming Privilege-Escalation Attacks on Android," in 19th Annual Network & Distributed System Security Symposium, ser. NDSS '12, Feb. 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium, Ser. NDSS '12
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
29
-
-
85037073388
-
Privilege escalation attacks on Android
-
Berlin, Heidelberg: Springer-Verlag
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, "Privilege escalation attacks on Android," in Proceedings of the 13th International Conference on Information Security, ser. ISC'10. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 346-360.
-
(2011)
Proceedings of the 13th International Conference on Information Security, Ser. ISC'10
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
30
-
-
84893790582
-
An antivirus API for Android malware recognition
-
Oct
-
R. Fedler, M. Kulicke, and J. Schütte, "An antivirus API for Android malware recognition," in Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on, Oct 2013, pp. 77-84.
-
(2013)
Malicious and Unwanted Software: The Americas (MALWARE), 2013 8th International Conference on
, pp. 77-84
-
-
Fedler, R.1
Kulicke, M.2
Schütte, J.3
-
31
-
-
84863066873
-
Malware virtualization-resistant behavior detection
-
M.-K. Sun, M.-J. Lin, M. Chang, C.-S. Laih, and H.-T. Lin, "Malware virtualization-resistant behavior detection. " in ICPADS. IEEE, 2011, pp. 912-917.
-
(2011)
ICPADS. IEEE
, pp. 912-917
-
-
Sun, M.-K.1
Lin, M.-J.2
Chang, M.3
Laih, C.-S.4
Lin, H.-T.5
-
32
-
-
84857329765
-
Detecting environment-sensitive malware
-
Berlin, Heidelberg: Springer-Verlag
-
M. Lindorfer, C. Kolbitsch, and P. Milani Comparetti, "Detecting environment-sensitive malware," in Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, ser. RAID'11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 338-357.
-
(2011)
Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, Ser. RAID'11
, pp. 338-357
-
-
Lindorfer, M.1
Kolbitsch, C.2
Milani Comparetti, P.3
-
33
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for Android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ""Andromaly": A behavioral malware detection framework for Android devices," Journal of Intelligent Information Systems, vol. 38, no. 1, pp. 161-190, 2012.
-
(2012)
Journal of Intelligent Information Systems
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
34
-
-
85178287263
-
DREBIN: Effective and explainable detection of android malware in your pocket
-
San Diego, CA, February
-
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, "DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket," in Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.
-
(2014)
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
35
-
-
84872113696
-
Efficient detection of split personalities in malware
-
San Diego, CA, Mar.
-
D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna, "Efficient detection of split personalities in malware," in In Proceedings of the Symposium on Network and Distributed System Security (NDSS), San Diego, CA, Mar. 2010.
-
(2010)
Proceedings of the Symposium on Network and Distributed System Security (NDSS)
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
|