-
1
-
-
84922999202
-
-
Android Malware Genome Project. Online; Last Accessed March 1, 2014
-
Android Malware Genome Project. http: //www.malgenomeproject.org/, Online; Last Accessed March 1, 2014.
-
-
-
-
2
-
-
84923055002
-
-
GingerBreak. , Online; Last Accessed March 1, 2014
-
GingerBreak. http: //forum.xdadevelopers. com/showthread.php?t=1044765, Online; Last Accessed March 1, 2014.
-
-
-
-
3
-
-
84923055001
-
-
ProGuard. Online; Last Accessed March 1, 2014
-
ProGuard. http: //proguard.sourceforge.net/, Online; Last Accessed March 1, 2014.
-
-
-
-
4
-
-
84922999201
-
-
RageAgainstTheCage. /, Online; Last Accessed March 1, 2014
-
RageAgainstTheCage. https: //github.com/bibanon/androiddevelopment-codex/blob/master/General/Rooting/, Online; Last Accessed March 1, 2014.
-
-
-
-
5
-
-
84923026863
-
-
z4Root. Online; Last Accessed March 1, 2014
-
z4Root. https: //github.com/bibanon/android-developmentcodex/ blob/master/General/Rooting/z4root.md, Online; Last Accessed March 1, 2014.
-
-
-
-
6
-
-
84923026862
-
-
VirusTotal. Online; Last Accessed March 1, 2014
-
VirusTotal. https: //www.virustotal.com/, Online; Last Accessed March 1, 2014.
-
-
-
-
7
-
-
84923055000
-
-
APKTool. Reverse Engineering with Apktool. , Online; Accessed March 1, 2014
-
APKTool. Reverse Engineering with Apktool. https: // code.google.com/android/apk-tool, Online; Accessed March 1, 2014.
-
-
-
-
8
-
-
84922999200
-
-
AppBrain. Number of applications available on Google Play. , Online; Last accessed March 1, 2014
-
AppBrain. Number of applications available on Google Play. http: //www.appbrain.com/stats/number-of-Android-Apps, Online; Last accessed March 1, 2014.
-
-
-
-
9
-
-
84923026861
-
-
AV-Test. AV-Test, The Independent IT-Security Institute. Online; Accessed March 27 2014
-
AV-Test. AV-Test, The Independent IT-Security Institute. http: //www.av-test.org/en/home/, Online; Accessed March 27 2014.
-
-
-
-
10
-
-
84922999199
-
-
BakSmali. Reverse Engineering with Smali/Baksmali. , Online; Accessed March 20 2013
-
BakSmali. Reverse Engineering with Smali/Baksmali. https: //code.google.com/smali, Online; Accessed March 20 2013.
-
-
-
-
11
-
-
84922999198
-
-
BlackHat. Reverse Engineering with Androguard. , Online; Accessed March 1, 2014
-
BlackHat. Reverse Engineering with Androguard. https: //code.google.com/androguard, Online; Accessed March 1, 2014.
-
-
-
-
12
-
-
84893229737
-
Android malware past, present, and future
-
Carlos A. Castillo. Android Malware Past, Present, and Future. Technical report, MSWC, 2012.
-
(2012)
Technical Report, MSWC
-
-
Castillo, C.A.1
-
15
-
-
84923054999
-
-
Contagiodump. Contagio Malware Dump. , Online; Accessed March 1, 2013
-
Contagiodump. Contagio Malware Dump. http: // contagiodump.blogspot.in/, Online; Accessed March 1, 2013.
-
-
-
-
16
-
-
84900434211
-
The best of both worlds: A framework for the synergistic operation of host and cloud anomaly-based ids for smartphones
-
New York, NY, USA,. ACM
-
Dimitrios Damopoulos, Georgios Kambourakis, and Georgios Portokalidis. The best of both worlds: A framework for the synergistic operation of host and cloud anomaly-based ids for smartphones. In Proceedings of the Seventh European Workshop on System Security, EuroSec '14, pages 6: 1-6: 6, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the Seventh European Workshop on System Security, EuroSec '14
, pp. 61-66
-
-
Damopoulos, D.1
Kambourakis, G.2
Portokalidis, G.3
-
17
-
-
84923054998
-
-
Dex2Jar. Adroid Decompiling with Dex2jar. Online;Accessed March 1, 2014
-
Dex2Jar. Adroid Decompiling with Dex2jar. http: //code. google.com/p/dex2jar/, Online;Accessed March 1, 2014.
-
-
-
-
18
-
-
84893307989
-
AndroSimilar: Robust statistical feature signature for android malware detection
-
New York, NY, USA,. ACM
-
Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, M. S. Gaur, and Ammar Bharmal. AndroSimilar: Robust Statistical Feature Signature for Android Malware Detection. In Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13, pages 152-159, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13
, pp. 152-159
-
-
Faruki, P.1
Ganmoor, V.2
Laxmi, V.3
Gaur, M.S.4
Bharmal, A.5
-
19
-
-
84884658330
-
A framework for evaluating mobile app repackaging detection algorithms
-
Heqing Huang, Sencun Zhu, Peng Liu, and Dinghao Wu. A Framework for Evaluating Mobile App Repackaging Detection Algorithms. In TRUST, pages 169-186, 2013.
-
(2013)
TRUST
, pp. 169-186
-
-
Huang, H.1
Zhu, S.2
Liu, P.3
Wu, D.4
-
20
-
-
84923026860
-
-
Gartner Inc. Android Smartphone Sales Report, 2013. , Online;Last Accessed March 1, 2014
-
Gartner Inc. Android Smartphone Sales Report, 2013. http: //www.gartner.com/newsroom/id/2482816, Online;Last Accessed March 1, 2014.
-
-
-
-
21
-
-
84954194661
-
Efficient code obfuscation for android
-
Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, and Vithida Chongsuphajaisiddhi, editors, Springer
-
Aleksandrina Kovacheva. Efficient code obfuscation for android. In Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, and Vithida Chongsuphajaisiddhi, editors, IAIT, volume 409 of Communications in Computer and Information Science, pages 104-119. Springer, 2013.
-
(2013)
IAIT Vol 409 of Communications in Computer and Information Science
, pp. 104-119
-
-
Kovacheva, A.1
-
22
-
-
84922972567
-
-
ESET Latin America's Lab. Trends for 2013, Astounding growth of mobile malware. Technical report, ESET Antivirus Laboratory
-
ESET Latin America's Lab. Trends for 2013, Astounding growth of mobile malware. Technical report, ESET Antivirus Laboratory.
-
-
-
-
23
-
-
0004135418
-
-
John Wiley &Sons, Inc., New York, NY, USA
-
Glenford J. Myers. Art of Software Testing. John Wiley &Sons, Inc., New York, NY, USA, 1979.
-
(1979)
Art of Software Testing
-
-
Myers, G.J.1
-
24
-
-
85081771834
-
Retargeting android applications to java bytecode
-
New York, NY, USA,. ACM
-
Damien Octeau, Somesh Jha, and Patrick McDaniel. Retargeting Android Applications to Java Bytecode. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE '12, pages 6: 1-6: 11, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE '12
, pp. 61-611
-
-
Octeau, D.1
Jha, S.2
McDaniel, P.3
-
25
-
-
84923054473
-
-
Google Play. Official Android Market. Online;Last Accessed March 1, 2014
-
Google Play. Official Android Market. https: //market.android. com/., Online;Last Accessed March 1, 2014.
-
-
-
-
26
-
-
84878002579
-
DroidChameleon: Evaluating android anti-malware against transformation attacks
-
New York, NY, USA,. ACM
-
Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. DroidChameleon: Evaluating Android Anti-malware Against Transformation Attacks. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS '13, pages 329-334, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS '13
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
27
-
-
84923054472
-
Detecting targeted smartphone malware with behavior-triggering stochastic models
-
Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, and Pedro Peris-Lopez. Detecting targeted smartphone malware with behavior-triggering stochastic models. In In Proceedings of the European Symposium on Research in Computer Security, to appear, ESORICS 2014. ESORICS, 2014.
-
(2014)
Proceedings of the European Symposium on Research in Computer Security, to Appear, ESORICS 2014. ESORICS
-
-
Guillermo, S.-T.1
Conti, M.2
Tapiador, J.E.3
Pedro, P.-L.4
-
28
-
-
84893234977
-
PEAL-packed executable analysis
-
Laxmi Vijay, Gaur Manoj Singh, Faruki Parvez, and Naval Smita. PEAL-Packed Executable AnaLysis. In Proceedings of International Conference on Advanced Computing Networking and Security, ADCONS '11. SPRINGER, 2011.
-
(2011)
Proceedings of International Conference on Advanced Computing Networking and Security, ADCONS '11. SPRINGER
-
-
Vijay, L.1
Singh, G.M.2
Parvez, F.3
Smita, N.4
-
29
-
-
84922973832
-
-
VirusShare. VirusShare. Online; Accessed 1st March 2014
-
VirusShare. VirusShare. http: //www.virusshare.com/, Online; Accessed 1st March 2014.
-
-
-
-
31
-
-
84875665845
-
ADAM: An automatic and extensible platform to stress test android anti-virus systems
-
Min Zheng, Patrick P. C. Lee, and John C. S. Lui. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. In DIMVA, pages 82-101, 2012.
-
(2012)
DIMVA
, pp. 82-101
-
-
Zheng, M.1
Lee, P.P.C.2
Lui, J.C.S.3
-
32
-
-
84874828789
-
Fast, scalable detection of piggybacked rfsti mobile applications
-
New York, NY, USA,. ACM
-
Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. Fast, Scalable Detection of "Piggybacked" Mobile Applications. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13, pages 185-196, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13
, pp. 185-196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
33
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
New York, USA
-
Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces. In Proceedings of Second ACM conference on Data Application Security and Privacy, CODASPY '12, pages 317-326, New York, USA, 2012
-
(2012)
Proceedings of Second ACM Conference on Data Application Security and Privacy, CODASPY '12
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|