메뉴 건너뛰기




Volumn 17, Issue 2, 2015, Pages 998-1022

Android security: A survey of issues, malware penetration, and defenses

Author keywords

Android Malware; Behavioral Analysis; Dynamic Analysis; Obfuscation; Static Analysis; Stealth Malwar

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); COMPETITION; COMPUTER CRIME; COSINE TRANSFORMS; DYNAMIC ANALYSIS; LOCATION BASED SERVICES; MALWARE; MOBILE SECURITY; MULTIMEDIA SERVICES; SMARTPHONES; STATIC ANALYSIS; SURVEYS; TELECOMMUNICATION SERVICES;

EID: 84930507568     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2014.2386139     Document Type: Article
Times cited : (499)

References (143)
  • 1
    • 84930503932 scopus 로고    scopus 로고
    • (Online; Last Accessed Mar
    • G. Inc., Android Smartphone Sales Report, 2013, (Online; Last Accessed Mar. 17, 2014). [Online]. Available: http://www.gartner.com/newsroom/id/2665715
    • (2014) Android Smartphone Sales Report, 2013 , vol.17
    • Inc, G.1
  • 2
    • 84930503223 scopus 로고    scopus 로고
    • Online; Last Accessed Feb
    • Android Malware Genome Project, (Online; Last Accessed Feb. 11, 2014). [Online]. Available: http://www.malgenomeproject.org/
    • (2014) Android Malware Genome Project , vol.11
  • 3
    • 84893229737 scopus 로고    scopus 로고
    • Android malware past, present, future
    • Santa Clara, CA, USA, Tech. Rep
    • C. A. Castillo, "Android malware past, present, future" Mobile Working Security Group McAfee, Santa Clara, CA, USA, Tech. Rep., 2012
    • (2012) Mobile Working Security Group McAfee
    • Castillo, C.A.1
  • 4
    • 85137132511 scopus 로고    scopus 로고
    • Detecting repackaged smartphone applications in third-party android marketplaces
    • W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "Detecting repackaged smartphone applications in third-party android marketplaces" in Proc. 2nd ACM CODASPY, New York, NY, USA, 2012, pp. 317-326. [Online]. Available: http://doi.acm.org/10.1145/2133601.2133640
    • (2012) Proc. 2nd ACM CODASPY, New York, NY, USA , pp. 317-326
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3    Ning, P.4
  • 6
    • 84930507760 scopus 로고    scopus 로고
    • (Online; Last Accessed Oct 15 2013)
    • Google Bouncer: Protecting the Google Play market, (Online; Last Accessed Oct. 15, 2013). [Online]. Available: http://blog.trendmicro.com/trendlabs-security-intelligence/a-lookat-google-bouncer/
    • Google Bouncer: Protecting the Google Play Market
  • 7
    • 84865574920 scopus 로고    scopus 로고
    • (Online; Last Accessed Oct 15 2013)
    • Android and security: Official mobile google blog, (Online; Last Accessed Oct. 15, 2013). [Online]. Available: http://googlemobile.blogspot. in/2012/02/android-and-security.html
    • Android and Security: Official Mobile Google Blog
  • 8
    • 79961035117 scopus 로고    scopus 로고
    • Analyzing interapplication communication in Android
    • New York, NY, USA
    • E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing interapplication communication in Android" in Proc. 9th Int. Conf. MobiSys, New York, NY, USA, 2011, pp. 239-252. [Online]. Available: http://doi. acm.org/10.1145/1999995.2000018
    • (2011) Proc. 9th Int. Conf. MobiSys , pp. 239-252
    • Chin, E.1    Felt, A.P.2    Greenwood, K.3    Wagner, D.4
  • 10
    • 84930508027 scopus 로고    scopus 로고
    • Baidu, (Online; Last Accessed Mar 1 2014)
    • Baidu, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://as.baidu.com/
  • 11
    • 84930505303 scopus 로고    scopus 로고
    • Online; Last Accessed Mar 1 2014
    • Opera Mobile App Store, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://apps.opera.com/en-in/
    • Opera Mobile App Store
  • 12
    • 84930503993 scopus 로고    scopus 로고
    • App China (Online; Last Accessed Mar 1 2014)
    • AppChina, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://www.appchina.com/
  • 13
    • 84930506580 scopus 로고    scopus 로고
    • GetJar, (Online; Last AccessedMar 1 2014)
    • GetJar, (Online; Last AccessedMar. 1, 2014). [Online]. Available: http://www.getjar.mobi/
  • 16
    • 85009747409 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11)
    • McAfee Labs Threats Report: Third Quarter 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.mcafee.com/uk/resources/reports/rp-quarterly-Threatq3-2013.pdf
    • McAfee Labs Threats Report: Third Quarter 2013
  • 17
    • 84930508051 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • F-Secure: Mobile Threat Report Q1 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.fsecure.com/static/doc/labs-global/Research/Mobile-Threat-Report-Q1-2013.pdf
    • (2013) F-Secure: Mobile Threat Report Q1
  • 18
    • 84930508051 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • F-Secure: Mobile Threat Report Q3 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.fsecure.com/static/doc/labs-global/Research/Mobile-Threat-Report-Q3-2013.pdf
    • (2013) F-Secure: Mobile Threat Report Q3
  • 19
    • 84930508051 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • F-Secure: Mobile Threat Report H1 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.fsecure.com/static/doc/labs-global/Research/Threat-Report-H1-2013.pdf
    • (2013) F-Secure: Mobile Threat Report H1
  • 20
    • 84930504741 scopus 로고    scopus 로고
    • VirusTotal, (Online; Last Accessed Feb 11 2014)
    • VirusTotal, (Online; Last Accessed Feb. 11, 2014). [Online]. Available: https://www.virustotal.com/
  • 21
    • 84930508474 scopus 로고    scopus 로고
    • Android.Bgserv (Online; Last Accesed Feb 12 2011)
    • Android.Bgserv, (Online; Last Accesed Feb. 12, 2011). [Online]. Available: http://www.symantec.com/security-response/writeup.jsp? docid=2011-031005-2918-99
  • 22
    • 84930506179 scopus 로고    scopus 로고
    • Backdoor.AndroidOS.Obad.a, (Online; Last Accesed Dec 25 2013)
    • Backdoor.AndroidOS.Obad.a, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://contagiominidump.blogspot.in/2013/06/backdoorandroidosobada.html
  • 23
    • 84930503806 scopus 로고    scopus 로고
    • RageAgainstTheCage, (Online; Last Accessed Feb. 11). [Online]. Available:
    • RageAgainstTheCage, (Online; Last Accessed Feb. 11). [Online]. Available: https://github.com/bibanon/android-development-codex/blob/master/General/Rooting/rageagainstthecage.md
  • 24
    • 84930504576 scopus 로고    scopus 로고
    • Android Hipposms (Online; 2011)
    • Android Hipposms, (Online; 2011). [Online]. Available: http://www.csc. ncsu.edu/faculty/jiang/HippoSMS/
  • 25
    • 84930504490 scopus 로고    scopus 로고
    • (Online; Last Accesed Dec 25 2013)
    • Android/NotCompatible Looks Like Piece of PC Botnet, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://blogs.mcafee.com/mcafee-labs/androidnotcompatible-looks-like-piece-of-pc-botnet
    • Android/NotCompatible Looks Like Piece of PC Botnet
  • 26
    • 84878309098 scopus 로고    scopus 로고
    • FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment
    • Jun. 2013
    • E. Fernandes, B. Crispo, and M. Conti, "FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment" IEEE Trans. Inf. Forensics Security, vol. 8, no. 6, pp. 1027-1037, Jun. 2013. [Online]. Available: http://dblp.uni-Trier.de/db/journals/tifs/tifs8.html# FernandesCC13
    • IEEE Trans. Inf. Forensics Security , vol.8 , Issue.6 , pp. 1027-1037
    • Fernandes, E.1    Crispo, B.2    Conti, M.3
  • 27
    • 84889036292 scopus 로고    scopus 로고
    • On the effectiveness of malware protection on android
    • Berlin, Germany, Tech. Rep
    • R. Fedler, J. Schütte, and M. Kulicke, "On the Effectiveness of Malware Protection on Android" Fraunhofer AISEC, Berlin, Germany, Tech. Rep., 2013
    • (2013) Fraunhofer AISEC
    • Fedler, R.1    Schütte, J.2    Kulicke, M.3
  • 29
    • 84907381443 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • Kaspersky Internet Security for Android, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.kaspersky.com/android-security
    • Kaspersky Internet Security for Android
  • 30
    • 84864334986 scopus 로고    scopus 로고
    • RiskRanker: Scalable and accurate zero-day Android malware detection
    • M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "RiskRanker: Scalable and accurate zero-day Android malware detection" in Proc. 10th Int. Conf. MobiSys, New York, NY, USA, 2012, pp. 281-294. [Online]. Available: http://doi.acm.org/10.1145/2307636.2307663
    • (2012) Proc. 10th Int. Conf. MobiSys, New York, NY, USA , pp. 281-294
    • Grace, M.1    Zhou, Y.2    Zhang, Q.3    Zou, S.4    Jiang, X.5
  • 33
    • 81855220939 scopus 로고    scopus 로고
    • Defending users against smartphone apps: Techniques and future directions
    • W. Enck, "Defending users against smartphone apps: Techniques and future directions" in Proc. 7th ICISS, 2011, pp. 49-70. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-25560-1n-3
    • (2011) Proc. 7th ICISS , pp. 49-70
    • Enck, W.1
  • 34
    • 84930507712 scopus 로고    scopus 로고
    • Android Security Overview (Online; Last Accesed Dec 25 2013)
    • Android Security Overview, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security
  • 35
    • 60049085302 scopus 로고    scopus 로고
    • Understanding android security
    • Jan./Feb
    • W. Enck, M. Ongtang, and P. McDaniel, "Understanding android security" IEEE Security Privacy, vol. 7, no. 1, pp. 50-57, Jan./Feb. 2009. [Online]. Available: http://dx.doi.org/10.1109/MSP.2009.26
    • (2009) IEEE Security Privacy , vol.7 , Issue.1 , pp. 50-57
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 36
    • 84930507026 scopus 로고    scopus 로고
    • Android Kernel Features (Online; Last Accessed Mar 9 2014). [Online]. Available:
    • Android Kernel Features, (Online; Last Accessed Mar. 9, 2014). [Online]. Available: http://elinux.org/Android-Kernel-Features
  • 39
    • 84930508304 scopus 로고    scopus 로고
    • Online; Last Accessed Jun
    • J. Oberhide, Dissecting the Android Bouncer, (Online; Last Accessed Jun. 1, 2012). [Online]. Available: http://jon.oberheide.org/blog/2012/06/21/dissecting-The-android-bouncer/
    • (2012) Dissecting the Android Bouncer , vol.1
    • Oberhide, J.1
  • 41
    • 84930504961 scopus 로고    scopus 로고
    • CVE, (Online; Last Accessed Feb. 11)
    • CVE, (Online; Last Accessed Feb. 11). [Online]. Available: http://cve. mitre.org/
  • 44
    • 84914140121 scopus 로고    scopus 로고
    • Upgrading your android, elevating my malware: Privilege escalation through mobile OS updating
    • L. Xing, X. Pan, R. Wang, K. Yuan, and X. Wang, "Upgrading your android, elevating my malware: Privilege escalation through mobile OS updating" in Proc. IEEE Symp. Security Privacy, 2014, pp. 393-408
    • (2014) Proc IEEE Symp. Security Privacy , pp. 393-408
    • Xing, L.1    Pan, X.2    Wang, R.3    Yuan, K.4    Wang, X.5
  • 45
    • 84930508023 scopus 로고    scopus 로고
    • z4Root, (Online; Last Accessed Feb. 11). [Online]
    • z4Root, (Online; Last Accessed Feb. 11). [Online]. Available: https://github.com/bibanon/android-developmentcodex/blob/master/General/Rooting/z4root.md
  • 46
    • 84878360990 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11)
    • Android Trickery, (Online; Last Accessed Feb. 11). [Online]. Available: http://c-skills.blogspot.com/2010/07/androidtrickery.html
    • Android Trickery
  • 48
    • 84930506089 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • GingerBreak, (Online; Last Accessed Feb. 11). [Online]. Available: http://forum.xda-developers.com/showthread.php?t=1044765
    • Ginger Break
  • 49
    • 84930506185 scopus 로고    scopus 로고
    • Zergrush, (Online; Last Accessed Feb. 11). [Online]. Available:
    • zergrush, (Online; Last Accessed Feb. 11). [Online]. Available: http://forum.xda-developers.com/showthread.php?t=1296916
  • 50
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • Oakland, CA, USA
    • Z. Yajin and J. Xuxian, "Dissecting android malware: Characterization and evolution" in Proc. 33rd IEEE Symp. Security Privacy, Oakland, CA, USA, 2012, pp. 95-109
    • (2012) Proc. 33rd IEEE Symp. Security Privacy , pp. 95-109
    • Yajin, Z.1    Xuxian, J.2
  • 51
    • 84930503467 scopus 로고    scopus 로고
    • Security Enhancements in Android 4.3, (Online; Last Accesed Dec 25 2013
    • Security Enhancements in Android 4.3, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security/enhancements43.html
  • 52
    • 84930505627 scopus 로고    scopus 로고
    • Security Enhancements in Android 4.2, (Online; Last Accesed Dec 25 2013
    • Security Enhancements in Android 4.2, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security/enhancements42.html
  • 53
    • 78751498804 scopus 로고    scopus 로고
    • Paranoid android: Versatile protection for smartphones
    • New York, NY, USA
    • G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid android: Versatile protection for smartphones" in Proc. 26th ACSAC, New York, NY, USA, 2010, pp. 347-356. [Online]. Available: http://doi.acm.org/10.1145/1920261.1920313
    • (2010) Proc. 26th ACSAC , pp. 347-356
    • Portokalidis, G.1    Homburg, P.2    Anagnostakis, K.3    Bos, H.4
  • 54
    • 84930503460 scopus 로고    scopus 로고
    • Online; Last Accesed Dec, 25
    • Validating Security-Enhanced Linux in Android, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security/se-linux.html
    • (2013) Validating Security-Enhanced Linux in Android
  • 56
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • D. Feng, D. A. Basin, and P. Liu, Eds
    • M. Nauman, S. Khan, and X. Zhang, "Apex: Extending android permission model and enforcement with user-defined runtime constraints" in Proc. ASIACCS, D. Feng, D. A. Basin, and P. Liu, Eds., 2010, pp. 328-332. [Online]. Available: http://dblp.uni-Trier.de/db/conf/ccs/asiaccs2010.html#NaumanKZ10
    • (2010) Proc. ASIACCS , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 58
    • 77950851532 scopus 로고    scopus 로고
    • Semantically rich application-centric security in android
    • M. Ongtang, S. E. McLaughlin, W. Enck, and P. D. McDaniel, "Semantically rich application-centric security in android" in Proc. ACSAC, 2009, pp. 340-349. [Online]. Available: http://dblp.uni-Trier.de/db/conf/acsac/acsac2009.html#OngtangMEM09
    • (2009) Proc. ACSAC , pp. 340-349
    • Ongtang, M.1    McLaughlin, S.E.2    Enck, W.3    McDaniel, P.D.4
  • 60
    • 84908673508 scopus 로고    scopus 로고
    • Lookout Mobile Security, Tech. rep
    • "State of mobile security" Lookout Mobile Security, Tech. rep., 2012
    • (2012) State of Mobile Security
  • 61
    • 84930505939 scopus 로고    scopus 로고
    • Lookout Mobile Security, San Francisco, CA, USA, Tech. rep
    • "Current world of mobile threats" Lookout Mobile Security, San Francisco, CA, USA, Tech. rep., 2013
    • (2013) Current World of Mobile Threats
  • 62
    • 84951915648 scopus 로고    scopus 로고
    • The core of the matter: Analyzing malicious traffic in cellular carriers
    • C. Lever, M. Antonakakis, B. Reaves, P. Traynor, and W. Lee, "The core of the matter: Analyzing malicious traffic in cellular carriers" in Proc. NDSS, 2013, vol. 13, pp. 1-16
    • (2013) Proc. NDSS , vol.13 , pp. 1-16
    • Lever, C.1    Antonakakis, M.2    Reaves, B.3    Traynor, P.4    Lee, W.5
  • 63
    • 84907413882 scopus 로고    scopus 로고
    • The company you keep: Mobile malware infection rates and inexpensive risk indicators
    • H. T. T. Truong et al., "The company you keep: Mobile malware infection rates and inexpensive risk indicators" in Proc. 23rd Int. Conf. WWW, 2013, pp. 39-50
    • (2013) Proc. 23rd Int. Conf WWW , pp. 39-50
    • Truong, H.T.T.1
  • 64
    • 84930507606 scopus 로고    scopus 로고
    • (Online; Last Accesed Dec 25 2013)
    • Carat: Collaborative Energy Diagnosis, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://carat.cs.berkeley.edu/
    • Carat: Collaborative Energy Diagnosis
  • 65
    • 84930503992 scopus 로고    scopus 로고
    • Fake Netxflix-Android trojan info stealer, (Online; Last Accessed Feb. 11)
    • Fake Netxflix-Android trojan info stealer, (Online; Last Accessed Feb. 11). [Online]. Available: http://contagiominidump.blogspot.in/2011/10/fake-netxflix-adtroid-Trojan-info.html
  • 67
    • 84930506782 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • Spitmo vs Zitmo: Banking Trojans Target Android, (Online; Last Accessed Feb. 11). [Online]. Available: https://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-Trojans-Target-android
    • Spitmo Vs Zitmo: Banking Trojans Target Android
  • 68
    • 84930508497 scopus 로고    scopus 로고
    • Fakedefender.B-Android Fake Antivirus (
    • Fakedefender.B-Android Fake Antivirus, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://contagiominidump.blogspot. in/2013/11/fakedefenderb-android-fake-antivirus.html
    • Online; Last Accesed Dec 25 2013
  • 69
    • 84930507236 scopus 로고    scopus 로고
    • Avast! Free Mobile Security (Online; Last Accessed Dec 25 2013)
    • avast! Free Mobile Security, (Online; Last Accessed Dec. 25, 2013). [Online]. Available: http://www.avast.com/freemobile-security-c? utmexpid=22755838-21.bXJmQHnQA6pakUW6PaLQQ.2& utmreferrer=https%3A%2F%2Fwww.google.com%2F
  • 71
    • 84930508495 scopus 로고    scopus 로고
    • A. Inc Class to Dex Conversion with Dx, (Online; Last Accessed Mar 5 2013)
    • A. Inc., Class to Dex Conversion with Dx, (Online; Last Accessed Mar. 5, 2013). [Online]. Available: http://developer.android.com/tools/help/index.html
  • 72
    • 84930503640 scopus 로고    scopus 로고
    • (Online; Last Accessed Dec 25 2013)
    • Remote Access Tool Takes Aim with Android APK Binder, (Online; Last Accessed Dec. 25, 2013). [Online]. Available: http://www.symantec. com/connect/blogs/remote-access-Tool-Takes-aimandroid-apk-binder
    • Remote Access Tool Takes Aim with Android APK Binder
  • 73
    • 84878002579 scopus 로고    scopus 로고
    • Droidchameleon: Evaluating Android anti-malware against transformation attacks
    • Comput. Commun. Security
    • V. Rastogi, Y. Chen, and X. Jiang, "Droidchameleon: Evaluating Android anti-malware against transformation attacks" in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 329-334
    • (2013) Proc. 8th ACM SIGSAC Symp. Inf , pp. 329-334
    • Rastogi, V.1    Chen, Y.2    Jiang, X.3
  • 74
    • 84889078034 scopus 로고    scopus 로고
    • ADAM: An automatic and extensible platform to stress test Android anti-virus systems
    • M. Zheng, P. P. C. Lee, and J. C. S. Lui, "ADAM: An automatic and extensible platform to stress test Android anti-virus systems" in Proc. DIMVA, 2012, pp. 82-101
    • (2012) Proc. DIMVA , pp. 82-101
    • Zheng, M.1    Lee, P.P.C.2    Lui, J.C.S.3
  • 75
    • 84930507519 scopus 로고    scopus 로고
    • ProGuard, (Online; Last Accessed Feb. 11)
    • ProGuard, (Online; Last Accessed Feb. 11). [Online]. Available: http://proguard.sourceforge.net/
  • 76
    • 84930505153 scopus 로고    scopus 로고
    • DexGuard, (Online; Last Accessed Feb. 11). [Online]. Available:
    • DexGuard, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.saikoa.com/dexguard
  • 77
    • 84923005881 scopus 로고    scopus 로고
    • Evaluation of android anti malware techniques against Dalvik bytecode obfuscation
    • Beijing, China, Sep 26-28
    • P. Faruki et al., "Evaluation of android anti malware techniques against Dalvik bytecode obfuscation" in Proc. 13th IEEE Int. Conf. TrustCom, Beijing, China, Sep. 26-28, 2014
    • (2014) Proc. 13th IEEE Int. Conf. TrustCom
    • Faruki, P.1
  • 78
    • 84906992682 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • Dalvik Bytecode Obfuscation on Android, (Online; Last Accessed Feb. 11). [Online]. Available: https://dexlabs.org/blog/bytecode-obfuscation
    • Dalvik Bytecode Obfuscation on Android
  • 79
    • 84930507503 scopus 로고    scopus 로고
    • (Online; Accessed Mar 29 2013). [Online]. Available:
    • BlackHat, Reverse Engineering with Androguard, (Online; Accessed Mar. 29, 2013). [Online]. Available: https://code.google.com/androguard
    • BlackHat, Reverse Engineering with Androguard
  • 80
    • 84869439259 scopus 로고    scopus 로고
    • Hey, you get off my market: Detecting malicious apps in official and third party android markets
    • New York, NY, USA
    • W. Zhou, Y. Zhou, and X. Jiang, "Hey, you get off my market: Detecting malicious apps in official and third party android markets" in Proc. Annu. NDSS, New York, NY, USA, 2012, pp. 1-13
    • (2012) Proc. Annu. NDSS , pp. 1-13
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3
  • 81
    • 84856225193 scopus 로고    scopus 로고
    • Andromaly: A behavioral malware detection framework for android devices
    • A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, "'Andromaly': A behavioral malware detection framework for android devices" J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161-190, 2012. [Online]. Available: http://dblp.uni-Trier.de/db/journals/jiis/jiis38.html#ShabtaiKEGW12
    • (2012) J. Intell. Inf. Syst , vol.38 , Issue.1 , pp. 161-190
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3    Glezer, C.4    Weiss, Y.5
  • 82
    • 84930506402 scopus 로고    scopus 로고
    • Apposcopy: Semanticsbased detection of android malware
    • Y. Feng, S. Anand, I. Dillig, and A. Aiken, "Apposcopy: Semanticsbased detection of android malware" in Proc. SIGSOFT FSE, 2014, pp. 1-12
    • (2014) Proc. SIGSOFT FSE , pp. 1-12
    • Feng, Y.1    Anand, S.2    Dillig, I.3    Aiken, A.4
  • 83
    • 84893307989 scopus 로고    scopus 로고
    • AndroSimilar: Robust statistical feature signature for Android malware detection
    • A. Eli M. S. Gaur, M. A. Orgun, and O. B. Makarevich, Eds
    • P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A. Bharmal, "AndroSimilar: Robust statistical feature signature for Android malware detection" in Proc. SIN, A. Eli, M. S. Gaur, M. A. Orgun, and O. B. Makarevich, Eds., 2013, pp. 152-159. [Online]. Available: http://dblp.uni-Trier.de/db/conf/sin/sin2013.html#FarukiGLGB13
    • (2013) Proc. SIN , pp. 152-159
    • Faruki, P.1    Ganmoor, V.2    Laxmi, V.3    Gaur, M.S.4    Bharmal, A.5
  • 85
    • 84869416020 scopus 로고    scopus 로고
    • CHEX: Statically vetting Android apps for component hijacking vulnerabilities
    • T. Yu, G. Danezis, and V. D. Gligor, Eds
    • L. Lu, Z. Li, Z.Wu,W. Lee, and G. Jiang, "CHEX: Statically vetting Android apps for component hijacking vulnerabilities" in Proc. ACM Conf. Comput. Commun. Security, T. Yu, G. Danezis, and V. D. Gligor, Eds., 2012, pp. 229-240. [Online]. Available: http://dblp.uni-Trier.de/db/conf/ccs/ccs2012.html#LuLWLJ12
    • (2012) Proc ACM Conf. Comput. Commun. Security , pp. 229-240
    • Lu, L.1    Li, Z.2    Lee Z.WuW.3    Jiang, G.4
  • 86
    • 84864033989 scopus 로고    scopus 로고
    • Android permissions: A perspective combining risks and benefits
    • B. P. Sarma et al., "Android permissions: A perspective combining risks and benefits" in Proc. 17th ACM Symp. Access ControlModels Technol., 2012, pp. 13-22
    • (2012) Proc. 17th ACM Symp. Access ControlModels Technol , pp. 13-22
    • Sarma, B.P.1
  • 87
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android" in Proc. 17th ACM Conf. CCS, 2010, pp. 73-84
    • (2010) Proc. 17th ACM Conf. CCS , pp. 73-84
    • Barrera, D.1    Kayacik, H.G.2    Van Oorschot, P.C.3    Somayaji, A.4
  • 88
    • 84903829962 scopus 로고    scopus 로고
    • Performance evaluation on permission-based detection for android malware
    • C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu, "Performance evaluation on permission-based detection for android malware" in Proc. Adv. Intell. Syst. Appl.-Vol. 2, 2013, vol. 2, pp. 111-120
    • (2013) Proc. Adv. Intell. Syst. Appl.-2 , vol.2 , pp. 111-120
    • Huang, C.-Y.1    Tsai, Y.-T.2    Hsu, C.-H.3
  • 90
  • 92
    • 85025148063 scopus 로고    scopus 로고
    • DroidAPIminer: Mining API-level features for robust malware detection in Android
    • T. Zia, A. Y. Zomaya, V. Varadharajan, and Z. M. Mao, Eds Springer
    • Y. Aafer, W. Du, and H. Yin, "DroidAPIminer: Mining API-level features for robust malware detection in Android" in Proc. SecureComm, vol. 127, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, T. Zia, A. Y. Zomaya, V. Varadharajan, and Z. M. Mao, Eds., Springer, 2013, pp. 86-103. [Online]. Available: http://dblp.uni-Trier.de/db/conf/securecomm/securecomm2013.html#AaferDY13
    • (2013) Proc. SecureComm 127, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , pp. 86-103
    • Aafer, Y.1    Du, W.2    Yin, H.3
  • 93
    • 84893446426 scopus 로고    scopus 로고
    • DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware
    • M. Zheng, M. Sun, and J. C. S. Lui, "DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware" in Proc. 12th IEEE Int. Conf. TrustCom, 2013, pp. 163-171
    • (2013) Proc. 12th IEEE Int. Conf. TrustCom , pp. 163-171
    • Zheng, M.1    Sun, M.2    Lui, J.C.S.3
  • 94
    • 84930504646 scopus 로고    scopus 로고
    • Online; Last AccessedMar
    • JD-GUI, Android Decompiling with JD-GUI, (Online; Last AccessedMar. 1, 2014). [Online]. Available: http://java.decompiler.free.fr/? q=jdgui
    • (2014) JD-GUI, Android Decompiling with JD-GUI , vol.1
  • 95
    • 84930507556 scopus 로고    scopus 로고
    • JAD JAD Java Decompiler (Online; Last Accessed Mar 1 2014). [Online]. Available:
    • JAD, JAD Java Decompiler, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://varaneckas.com/jad/
  • 96
    • 84875679301 scopus 로고    scopus 로고
    • (Online; Last Accessed Mar 1 2014)
    • H. van Vliet, Mocha, The Java Decompiler, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://www.brouhaha.com/-eric/software/mocha/
    • The Java Decompiler
    • Mocha Vliet H.Van1
  • 97
    • 84871271774 scopus 로고    scopus 로고
    • Online; Accessed Mar 1 2014)
    • SOOT, Soot: A Java optimization framework, (Online; Accessed Mar. 1, 2014). [Online]. Available: http://www.sable.mcgill.ca/soot/
    • SOOT Soot: A Java Optimization Framework
  • 98
    • 44949211954 scopus 로고    scopus 로고
    • (Online; Accessed Mar 1 2014)
    • WALA, T. J. Watson Libraries for Analysis (WALA), (Online; Accessed Mar. 1, 2014). [Online]. Available: http://wala.sourceforge.net/wiki/index.php/
    • Watson Libraries for Analysis (WALA)
    • Wala, T.J.1
  • 99
    • 85008234375 scopus 로고    scopus 로고
    • (Online; Accessed Mar 1 2014)
    • H. Inc., Fortify static code analyzer, (Online; Accessed Mar. 1, 2014). [Online]. Available: http://www8.hp.com/us/en/softwaresolutions/software.html?compURI=1338812
    • Fortify Static Code Analyzer
    • Inc, H.1
  • 100
    • 84930507405 scopus 로고    scopus 로고
    • A study of Android application security
    • San Francisco, CA, USA
    • E. William, O. Damien, M. Patrick, and C. Swarat, "A study of Android application security" in Proc. USENIX, San Francisco, CA, USA, 2011, p. 163
    • (2011) Proc. USENIX , pp. 163
    • William, E.1    Damien, O.2    Patrick, M.3    Swarat, C.4
  • 103
    • 84863084209 scopus 로고    scopus 로고
    • Androidleaks: Automatically detecting potential privacy leaks in Android applications on a large scale
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen, "Androidleaks: Automatically detecting potential privacy leaks in Android applications on a large scale" in Proc. Trust Trustworthy Comput., 2012, pp. 291-307
    • (2012) Proc. Trust Trustworthy Comput , pp. 291-307
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 104
    • 84930504700 scopus 로고    scopus 로고
    • (Online; Last Accessed May 15 2013)
    • Dex2Jar, Android Decompiling with Dex2jar, (Online; Last Accessed May 15, 2013). [Online]. Available: http://code.google.com/p/dex2jar/
    • Dex2Jar, Android Decompiling with Dex2jar
  • 105
    • 84870819587 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • UI/Application Exercise Monkey, (Online; Last Accessed Feb. 11). [Online]. Available: http://developer.android.com/tools/help/monkey. html
    • UI/Application Exercise Monkey
  • 106
    • 84982804575 scopus 로고    scopus 로고
    • Evading android runtime analysis via sandbox detection
    • New York, NY, USA
    • T. Vidas and N. Christin, "Evading android runtime analysis via sandbox detection" in Proc. 9th ACM ASIA CCS, New York, NY, USA, 2014, pp. 447-458. [Online]. Available: http://doi.acm.org/10.1145/2590296. 2590325
    • (2014) Proc. 9th ACM ASIA CCS , pp. 447-458
    • Vidas, T.1    Christin, N.2
  • 107
    • 84930525327 scopus 로고    scopus 로고
    • A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors
    • A. Reina, A. Fattori, and L. Cavallaro, "A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors" in Proc. EUROSEC, Prague, Czech Republic
    • Proc. EUROSEC, Prague, Czech Republic
    • Reina, A.1    Fattori, A.2    Cavallaro, L.3
  • 108
    • 84900434211 scopus 로고    scopus 로고
    • The best of both worlds: A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
    • D. Damopoulos, G. Kambourakis, and G. Portokalidis, "The best of both worlds: A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones" in Proc. 7th EuroSec, New York, NY, USA, 2014, pp. 6:1-6:6. [Online]. Available: http://doi.acm.org/10. 1145/2592791.2592797
    • (2014) Proc. 7th EuroSec, New York, NY, USA , pp. 61-66
    • Damopoulos, D.1    Kambourakis, G.2    Portokalidis, G.3
  • 109
    • 84930506033 scopus 로고    scopus 로고
    • TaintDroid: An information flow tracking system for realtime privacy monitoring on smartphones
    • E. William, G. Peter, C. Byunggon, and C. Landon, "TaintDroid: An information flow tracking system for realtime privacy monitoring on smartphones" in Proc. USENIX, 2011
    • (2011) Proc. USENIX
    • William, E.1    Peter, G.2    Byunggon, C.3    Landon, C.4
  • 111
    • 84877931620 scopus 로고    scopus 로고
    • User-centric dependence analysis for identifying malicious mobile apps
    • K. O. Elish, D. (Daphne) Yao, and B. G. Ryder, "User-centric dependence analysis for identifying malicious mobile apps" in Proc. Workshop MoST, 2012
    • (2012) Proc. Workshop MoST
    • Elish, K.O.1    Daphne Yao, D.2    Ryder, B.G.3
  • 112
    • 84994129817 scopus 로고    scopus 로고
    • AsDroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
    • J. Huang, X. Zhang, L. Tan, P.Wang, and B. Liang, "AsDroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction" in Proc. ICSE, 2014, pp. 1036-1046
    • (2014) Proc. ICSE , pp. 1036-1046
    • Huang, J.1    Zhang, X.2    Tan, L.3    Wang, P.4    Liang, B.5
  • 113
    • 85060493868 scopus 로고    scopus 로고
    • DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis
    • L. K. Yan and H. Yin, "DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis" in Proc. 21st USENIX Security Symp., 2012, p. 29
    • (2012) Proc. 21st USENIX Security Symp , pp. 29
    • Yan, L.K.1    Yin, H.2
  • 115
    • 84922670234 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb 11 2013). [Online]. Available:
    • DARE: Dalvik Retargeting, (Online; Last Accessed Feb. 11, 2013). [Online]. Available: http://siis.cse.psu.edu/dare/
    • DARE: Dalvik Retargeting
  • 116
    • 84930506736 scopus 로고    scopus 로고
    • Dedexer, (Online; Last Accessed Feb 11 2013)
    • Dedexer, (Online; Last Accessed Feb. 11, 2013). [Online]. http://dedexer. sourceforge.net/
  • 117
    • 84930504947 scopus 로고    scopus 로고
    • JEB Decompiler (Online; Last Accessed Feb 11 2013). [Online]. Available:
    • JEB Decompiler, (Online; Last Accessed Feb. 11, 2013). [Online]. Available: http://www.android-decompiler.com/
  • 118
    • 84930503256 scopus 로고    scopus 로고
    • Similarities for Fun & Profit
    • Similarities for Fun & Profit
  • 119
    • 84869417986 scopus 로고    scopus 로고
    • Data fingerprinting with similarity hashes, advances in digital forensics
    • V. Roussev, "Data fingerprinting with similarity hashes, advances in digital forensics" in Proc. Int. Conf. Digit. Forensics, 2010, pp. 207-226
    • (2010) Proc. Int. Conf. Digit. Forensics , pp. 207-226
    • Roussev, V.1
  • 120
    • 78650760396 scopus 로고    scopus 로고
    • Building a better similarity trap with statistically improbable features
    • V. Roussev, "Building a better similarity trap with statistically improbable features" in Proc. 42nd HICSS, 2009, pp. 1-10
    • (2009) Proc. 42nd HICSS , pp. 1-10
    • Roussev, V.1
  • 121
    • 84930505409 scopus 로고    scopus 로고
    • Andrubis, 2012. [Online]. Available: http://anubis.iseclab.org/
    • (2012) Andrubis
  • 123
    • 84930505882 scopus 로고    scopus 로고
    • APKInspector, 2013. [Online]. Available: https://github.com/honeynet/apkinspector/
    • (2013) APKInspector
  • 124
    • 84930503335 scopus 로고    scopus 로고
    • (Online; Last Accessed Feb. 11). [Online]. Available:
    • ded: Decompiling Android Applications, (Online; Last Accessed Feb. 11). [Online]. Available: http://siis.cse.psu.edu/ded/
    • Ded: Decompiling Android Applications
  • 125
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: Practical policy enforcement for Android applications
    • USENIX Association
    • R. Xu, H. Saïdi, and R. Anderson, "Aurasium: Practical policy enforcement for Android applications" in Proc. 21st USENIX Conf. Security Symp., 2012, pp. 27-27, USENIX Association
    • (2012) Proc. 21st USENIX Conf. Security Symp , pp. 27-27
    • Xu, R.1    Saïdi, H.2    Anderson, R.3
  • 126
    • 84959369172 scopus 로고    scopus 로고
    • Feb
    • Google Bouncer: Bad guys may have an app for that, Feb. 2012. [Online]. Available: http://www.techrepublic.com/blog/it-security/google-bouncer-badguys-may-have-an-app-for-That/7422/
    • (2012) Google Bouncer: Bad Guys May Have An App for That
  • 127
    • 84930504014 scopus 로고    scopus 로고
    • CopperDroid, Feb. 2012. [Online]. Available: http://copperdroid.isg. rhul.ac.uk/copperdroid/index.php
    • (2012) CopperDroid Feb
  • 128
    • 33746191665 scopus 로고    scopus 로고
    • Identifying almost identical files using context triggered piecewise hashing
    • Sep
    • J. Kornblum, "Identifying almost identical files using context triggered piecewise hashing" Digit. Investigation, vol. 3, pp. 91-97, Sep. 2006. [Online]. Available: http://dx.doi.org/10.1016/j.diin.2006.06.015
    • (2006) Digit. Investigation , vol.3 , pp. 91-97
    • Kornblum, J.1
  • 130
    • 84860660623 scopus 로고    scopus 로고
    • Unsafe exposure analysis of mobile in-app advertisements
    • New York, NY, USA
    • M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, "Unsafe exposure analysis of mobile in-app advertisements" in Proc. 5th ACM Conf. WISEC, New York, NY, USA, 2012, pp. 101-112. [Online]. Available: http://doi.acm.org/10.1145/2185448.2185464
    • (2012) Proc. 5th ACM Conf. WISEC , pp. 101-112
    • Grace, M.C.1    Zhou, W.2    Jiang, X.3    Sadeghi, A.-R.4
  • 131
    • 84903745241 scopus 로고    scopus 로고
    • Addetect: Automated detection of android ad libraries using semantic analysis
    • Singapore, Apr 21-24
    • A. Narayanan, L. Chen, and C. K. Chan, "Addetect: Automated detection of android ad libraries using semantic analysis" in Proc. IEEE 9th Int. Conf.ISSNIP, Singapore, Apr. 21-24, 2014, pp. 1-6. [Online]. Available: http://dx.doi.org/10.1109/ISSNIP.2014.6827639
    • (2014) Proc IEEE 9th Int. Conf.ISSNIP , pp. 1-6
    • Narayanan, A.1    Chen, L.2    Chan, C.K.3
  • 132
    • 84927778181 scopus 로고    scopus 로고
    • Android-based visual tag detection for visually impaired users: System design and testing
    • H. Dong, J. Kang, J. Schafer, and A. Ganz, "Android-based visual tag detection for visually impaired users: System design and testing" Int. J. E-Health Med. Commun., vol. 5, no. 1, pp. 63-80, 2014. [Online]. Available: http://dx.doi.org/10.4018/ijehmc.2014010104
    • (2014) Int. J. E-Health Med. Commun , vol.5 , Issue.1 , pp. 63-80
    • Dong, H.1    Kang, J.2    Schafer, J.3    Ganz, A.4
  • 133
    • 84930506639 scopus 로고    scopus 로고
    • Android platform invariant sandbox for analyzing malware and resource hogger apps
    • Beijing, China, Sep
    • P. Faruki, V. Ganmoor, L. Vijay, M. Gaur, and M. Conti, "Android Platform Invariant Sandbox for Analyzing Malware and Resource Hogger apps" in Proc. 10th IEEE Int. Conf. SecureComm, Beijing, China, Sep. 26-28, 2014, pp. 1-6
    • (2014) Proc. 10th IEEE Int. Conf. SecureComm , vol.26-28 , pp. 1-6
    • Faruki, P.1    Ganmoor, V.2    Vijay, L.3    Gaur, M.4    Conti, M.5
  • 136
    • 84930505807 scopus 로고    scopus 로고
    • Enter sandbox: Android sandbox comparison
    • S. Neuner et al., "Enter sandbox: Android sandbox comparison" in Proc. IEEE MoST, 2014
    • (2014) Proc IEEE MoST
    • Neuner, S.1
  • 137
    • 84930503365 scopus 로고    scopus 로고
    • A systematic security evaluation of android's multiuser framework
    • P. Ratazzi et al., "A systematic security evaluation of android's multiuser framework" in Proc. IEEE MoST, 2014, pp. 1-10
    • (2014) Proc IEEE MoST , pp. 1-10
    • Ratazzi, P.1
  • 140
    • 84968718794 scopus 로고    scopus 로고
    • Andrubis-1,000,000 apps later: A view on current Android malware behaviors
    • M. Lindorfer et al., "Andrubis-1,000,000 apps later: A view on current Android malware behaviors" in Proc. 3rd Int. Workshop BADGERS, 2014, pp. 1-15
    • (2014) Proc. 3rd Int. Workshop BADGERS , pp. 1-15
    • Lindorfer, M.1
  • 141
    • 84904090498 scopus 로고    scopus 로고
    • Andrubis: Android malware under the magnifying glass
    • Wien, Austria, Tech. Rep. TR-ISECLAB-
    • L.Weichselbaum et al., "Andrubis: Android malware under the magnifying glass" Vienna University of Technology, Wien, Austria, Tech. Rep. TR-ISECLAB-0414-001, 2014
    • (2014) Vienna University of Technology , pp. 0414-001
    • Weichselbaum, L.1
  • 143
    • 84869757378 scopus 로고    scopus 로고
    • SmartDroid: An automatic system for revealing UIbased trigger conditions in android applications
    • C. Zheng et al., "SmartDroid: An automatic system for revealing UIbased trigger conditions in android applications" in Proc. 2nd ACM Workshop SPSM, New York, NY, USA, 2012, pp. 93-104. [Online]. Available: http://doi.acm.org/10.1145/2381934.2381950
    • (2012) Proc. 2nd ACM Workshop SPSM, New York, NY, USA , pp. 93-104
    • Zheng, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.