-
1
-
-
84930503932
-
-
(Online; Last Accessed Mar
-
G. Inc., Android Smartphone Sales Report, 2013, (Online; Last Accessed Mar. 17, 2014). [Online]. Available: http://www.gartner.com/newsroom/id/2665715
-
(2014)
Android Smartphone Sales Report, 2013
, vol.17
-
-
Inc, G.1
-
2
-
-
84930503223
-
-
Online; Last Accessed Feb
-
Android Malware Genome Project, (Online; Last Accessed Feb. 11, 2014). [Online]. Available: http://www.malgenomeproject.org/
-
(2014)
Android Malware Genome Project
, vol.11
-
-
-
3
-
-
84893229737
-
Android malware past, present, future
-
Santa Clara, CA, USA, Tech. Rep
-
C. A. Castillo, "Android malware past, present, future" Mobile Working Security Group McAfee, Santa Clara, CA, USA, Tech. Rep., 2012
-
(2012)
Mobile Working Security Group McAfee
-
-
Castillo, C.A.1
-
4
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "Detecting repackaged smartphone applications in third-party android marketplaces" in Proc. 2nd ACM CODASPY, New York, NY, USA, 2012, pp. 317-326. [Online]. Available: http://doi.acm.org/10.1145/2133601.2133640
-
(2012)
Proc. 2nd ACM CODASPY, New York, NY, USA
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
6
-
-
84930507760
-
-
(Online; Last Accessed Oct 15 2013)
-
Google Bouncer: Protecting the Google Play market, (Online; Last Accessed Oct. 15, 2013). [Online]. Available: http://blog.trendmicro.com/trendlabs-security-intelligence/a-lookat-google-bouncer/
-
Google Bouncer: Protecting the Google Play Market
-
-
-
7
-
-
84865574920
-
-
(Online; Last Accessed Oct 15 2013)
-
Android and security: Official mobile google blog, (Online; Last Accessed Oct. 15, 2013). [Online]. Available: http://googlemobile.blogspot. in/2012/02/android-and-security.html
-
Android and Security: Official Mobile Google Blog
-
-
-
8
-
-
79961035117
-
Analyzing interapplication communication in Android
-
New York, NY, USA
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing interapplication communication in Android" in Proc. 9th Int. Conf. MobiSys, New York, NY, USA, 2011, pp. 239-252. [Online]. Available: http://doi. acm.org/10.1145/1999995.2000018
-
(2011)
Proc. 9th Int. Conf. MobiSys
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
84930508027
-
-
Baidu, (Online; Last Accessed Mar 1 2014)
-
Baidu, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://as.baidu.com/
-
-
-
-
11
-
-
84930505303
-
-
Online; Last Accessed Mar 1 2014
-
Opera Mobile App Store, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://apps.opera.com/en-in/
-
Opera Mobile App Store
-
-
-
12
-
-
84930503993
-
-
App China (Online; Last Accessed Mar 1 2014)
-
AppChina, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://www.appchina.com/
-
-
-
-
13
-
-
84930506580
-
-
GetJar, (Online; Last AccessedMar 1 2014)
-
GetJar, (Online; Last AccessedMar. 1, 2014). [Online]. Available: http://www.getjar.mobi/
-
-
-
-
16
-
-
85009747409
-
-
(Online; Last Accessed Feb. 11)
-
McAfee Labs Threats Report: Third Quarter 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.mcafee.com/uk/resources/reports/rp-quarterly-Threatq3-2013.pdf
-
McAfee Labs Threats Report: Third Quarter 2013
-
-
-
17
-
-
84930508051
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
F-Secure: Mobile Threat Report Q1 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.fsecure.com/static/doc/labs-global/Research/Mobile-Threat-Report-Q1-2013.pdf
-
(2013)
F-Secure: Mobile Threat Report Q1
-
-
-
18
-
-
84930508051
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
F-Secure: Mobile Threat Report Q3 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.fsecure.com/static/doc/labs-global/Research/Mobile-Threat-Report-Q3-2013.pdf
-
(2013)
F-Secure: Mobile Threat Report Q3
-
-
-
19
-
-
84930508051
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
F-Secure: Mobile Threat Report H1 2013, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.fsecure.com/static/doc/labs-global/Research/Threat-Report-H1-2013.pdf
-
(2013)
F-Secure: Mobile Threat Report H1
-
-
-
20
-
-
84930504741
-
-
VirusTotal, (Online; Last Accessed Feb 11 2014)
-
VirusTotal, (Online; Last Accessed Feb. 11, 2014). [Online]. Available: https://www.virustotal.com/
-
-
-
-
21
-
-
84930508474
-
-
Android.Bgserv (Online; Last Accesed Feb 12 2011)
-
Android.Bgserv, (Online; Last Accesed Feb. 12, 2011). [Online]. Available: http://www.symantec.com/security-response/writeup.jsp? docid=2011-031005-2918-99
-
-
-
-
22
-
-
84930506179
-
-
Backdoor.AndroidOS.Obad.a, (Online; Last Accesed Dec 25 2013)
-
Backdoor.AndroidOS.Obad.a, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://contagiominidump.blogspot.in/2013/06/backdoorandroidosobada.html
-
-
-
-
23
-
-
84930503806
-
-
RageAgainstTheCage, (Online; Last Accessed Feb. 11). [Online]. Available:
-
RageAgainstTheCage, (Online; Last Accessed Feb. 11). [Online]. Available: https://github.com/bibanon/android-development-codex/blob/master/General/Rooting/rageagainstthecage.md
-
-
-
-
24
-
-
84930504576
-
-
Android Hipposms (Online; 2011)
-
Android Hipposms, (Online; 2011). [Online]. Available: http://www.csc. ncsu.edu/faculty/jiang/HippoSMS/
-
-
-
-
25
-
-
84930504490
-
-
(Online; Last Accesed Dec 25 2013)
-
Android/NotCompatible Looks Like Piece of PC Botnet, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://blogs.mcafee.com/mcafee-labs/androidnotcompatible-looks-like-piece-of-pc-botnet
-
Android/NotCompatible Looks Like Piece of PC Botnet
-
-
-
26
-
-
84878309098
-
FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment
-
Jun. 2013
-
E. Fernandes, B. Crispo, and M. Conti, "FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment" IEEE Trans. Inf. Forensics Security, vol. 8, no. 6, pp. 1027-1037, Jun. 2013. [Online]. Available: http://dblp.uni-Trier.de/db/journals/tifs/tifs8.html# FernandesCC13
-
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.6
, pp. 1027-1037
-
-
Fernandes, E.1
Crispo, B.2
Conti, M.3
-
27
-
-
84889036292
-
On the effectiveness of malware protection on android
-
Berlin, Germany, Tech. Rep
-
R. Fedler, J. Schütte, and M. Kulicke, "On the Effectiveness of Malware Protection on Android" Fraunhofer AISEC, Berlin, Germany, Tech. Rep., 2013
-
(2013)
Fraunhofer AISEC
-
-
Fedler, R.1
Schütte, J.2
Kulicke, M.3
-
29
-
-
84907381443
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
Kaspersky Internet Security for Android, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.kaspersky.com/android-security
-
Kaspersky Internet Security for Android
-
-
-
30
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day Android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "RiskRanker: Scalable and accurate zero-day Android malware detection" in Proc. 10th Int. Conf. MobiSys, New York, NY, USA, 2012, pp. 281-294. [Online]. Available: http://doi.acm.org/10.1145/2307636.2307663
-
(2012)
Proc. 10th Int. Conf. MobiSys, New York, NY, USA
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
31
-
-
84901246064
-
Evolution, detection and analysis of malware for smart devices
-
G. Suarez-Tangil, J. Tapiador, P. Peris-Lopez, and A. Ribagorda, "Evolution, detection and analysis of malware for smart devices" IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp. 961-987, 2014
-
(2014)
IEEE Commun. Surveys Tuts
, vol.16
, Issue.2
, pp. 961-987
-
-
Suarez-Tangil, G.1
Tapiador, J.2
Peris-Lopez, P.3
Ribagorda, A.4
-
32
-
-
84873712223
-
A survey on security for mobile devices
-
M. La Polla, F. Martinelli, and D. Sgandurra, "A survey on security for mobile devices" IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 446-471, 2013
-
(2013)
IEEE Commun. Surveys Tuts
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
33
-
-
81855220939
-
Defending users against smartphone apps: Techniques and future directions
-
W. Enck, "Defending users against smartphone apps: Techniques and future directions" in Proc. 7th ICISS, 2011, pp. 49-70. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-25560-1n-3
-
(2011)
Proc. 7th ICISS
, pp. 49-70
-
-
Enck, W.1
-
34
-
-
84930507712
-
-
Android Security Overview (Online; Last Accesed Dec 25 2013)
-
Android Security Overview, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security
-
-
-
-
35
-
-
60049085302
-
Understanding android security
-
Jan./Feb
-
W. Enck, M. Ongtang, and P. McDaniel, "Understanding android security" IEEE Security Privacy, vol. 7, no. 1, pp. 50-57, Jan./Feb. 2009. [Online]. Available: http://dx.doi.org/10.1109/MSP.2009.26
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
36
-
-
84930507026
-
-
Android Kernel Features (Online; Last Accessed Mar 9 2014). [Online]. Available:
-
Android Kernel Features, (Online; Last Accessed Mar. 9, 2014). [Online]. Available: http://elinux.org/Android-Kernel-Features
-
-
-
-
39
-
-
84930508304
-
-
Online; Last Accessed Jun
-
J. Oberhide, Dissecting the Android Bouncer, (Online; Last Accessed Jun. 1, 2012). [Online]. Available: http://jon.oberheide.org/blog/2012/06/21/dissecting-The-android-bouncer/
-
(2012)
Dissecting the Android Bouncer
, vol.1
-
-
Oberhide, J.1
-
41
-
-
84930504961
-
-
CVE, (Online; Last Accessed Feb. 11)
-
CVE, (Online; Last Accessed Feb. 11). [Online]. Available: http://cve. mitre.org/
-
-
-
-
44
-
-
84914140121
-
Upgrading your android, elevating my malware: Privilege escalation through mobile OS updating
-
L. Xing, X. Pan, R. Wang, K. Yuan, and X. Wang, "Upgrading your android, elevating my malware: Privilege escalation through mobile OS updating" in Proc. IEEE Symp. Security Privacy, 2014, pp. 393-408
-
(2014)
Proc IEEE Symp. Security Privacy
, pp. 393-408
-
-
Xing, L.1
Pan, X.2
Wang, R.3
Yuan, K.4
Wang, X.5
-
45
-
-
84930508023
-
-
z4Root, (Online; Last Accessed Feb. 11). [Online]
-
z4Root, (Online; Last Accessed Feb. 11). [Online]. Available: https://github.com/bibanon/android-developmentcodex/blob/master/General/Rooting/z4root.md
-
-
-
-
46
-
-
84878360990
-
-
(Online; Last Accessed Feb. 11)
-
Android Trickery, (Online; Last Accessed Feb. 11). [Online]. Available: http://c-skills.blogspot.com/2010/07/androidtrickery.html
-
Android Trickery
-
-
-
48
-
-
84930506089
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
GingerBreak, (Online; Last Accessed Feb. 11). [Online]. Available: http://forum.xda-developers.com/showthread.php?t=1044765
-
Ginger Break
-
-
-
49
-
-
84930506185
-
-
Zergrush, (Online; Last Accessed Feb. 11). [Online]. Available:
-
zergrush, (Online; Last Accessed Feb. 11). [Online]. Available: http://forum.xda-developers.com/showthread.php?t=1296916
-
-
-
-
50
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Oakland, CA, USA
-
Z. Yajin and J. Xuxian, "Dissecting android malware: Characterization and evolution" in Proc. 33rd IEEE Symp. Security Privacy, Oakland, CA, USA, 2012, pp. 95-109
-
(2012)
Proc. 33rd IEEE Symp. Security Privacy
, pp. 95-109
-
-
Yajin, Z.1
Xuxian, J.2
-
51
-
-
84930503467
-
-
Security Enhancements in Android 4.3, (Online; Last Accesed Dec 25 2013
-
Security Enhancements in Android 4.3, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security/enhancements43.html
-
-
-
-
52
-
-
84930505627
-
-
Security Enhancements in Android 4.2, (Online; Last Accesed Dec 25 2013
-
Security Enhancements in Android 4.2, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security/enhancements42.html
-
-
-
-
53
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
New York, NY, USA
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid android: Versatile protection for smartphones" in Proc. 26th ACSAC, New York, NY, USA, 2010, pp. 347-356. [Online]. Available: http://doi.acm.org/10.1145/1920261.1920313
-
(2010)
Proc. 26th ACSAC
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
54
-
-
84930503460
-
-
Online; Last Accesed Dec, 25
-
Validating Security-Enhanced Linux in Android, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://source.android.com/devices/tech/security/se-linux.html
-
(2013)
Validating Security-Enhanced Linux in Android
-
-
-
55
-
-
84866302360
-
CRePe: A system for enforcing fine-grained context-related policies on android
-
Oct
-
M. Conti, B. Crispo, E. Fernandes, and Y. Zhauniarovich, "CRePe: A system for enforcing fine-grained context-related policies on android" Information Forensics and Security, IEEE Trans., vol. 7, no. 5, pp. 1426-1438, Oct. 2012
-
(2012)
Information Forensics and Security IEEE Trans
, vol.7
, Issue.5
, pp. 1426-1438
-
-
Conti, M.1
Crispo, B.2
Fernandes, E.3
Zhauniarovich, Y.4
-
56
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
D. Feng, D. A. Basin, and P. Liu, Eds
-
M. Nauman, S. Khan, and X. Zhang, "Apex: Extending android permission model and enforcement with user-defined runtime constraints" in Proc. ASIACCS, D. Feng, D. A. Basin, and P. Liu, Eds., 2010, pp. 328-332. [Online]. Available: http://dblp.uni-Trier.de/db/conf/ccs/asiaccs2010.html#NaumanKZ10
-
(2010)
Proc. ASIACCS
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
57
-
-
80755167433
-
Xmandroid: A new android evolution to mitigate privilege escalation attacks
-
Darmstadt, Germany, Tech. Rep. TR-
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, "Xmandroid: A new android evolution to mitigate privilege escalation attacks" Technische Universität Darmstadt, Darmstadt, Germany, Tech. Rep. TR-2011-04, 2011
-
(2011)
Technische Universität Darmstadt 2011-04
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
58
-
-
77950851532
-
Semantically rich application-centric security in android
-
M. Ongtang, S. E. McLaughlin, W. Enck, and P. D. McDaniel, "Semantically rich application-centric security in android" in Proc. ACSAC, 2009, pp. 340-349. [Online]. Available: http://dblp.uni-Trier.de/db/conf/acsac/acsac2009.html#OngtangMEM09
-
(2009)
Proc. ACSAC
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.E.2
Enck, W.3
McDaniel, P.D.4
-
60
-
-
84908673508
-
-
Lookout Mobile Security, Tech. rep
-
"State of mobile security" Lookout Mobile Security, Tech. rep., 2012
-
(2012)
State of Mobile Security
-
-
-
61
-
-
84930505939
-
-
Lookout Mobile Security, San Francisco, CA, USA, Tech. rep
-
"Current world of mobile threats" Lookout Mobile Security, San Francisco, CA, USA, Tech. rep., 2013
-
(2013)
Current World of Mobile Threats
-
-
-
62
-
-
84951915648
-
The core of the matter: Analyzing malicious traffic in cellular carriers
-
C. Lever, M. Antonakakis, B. Reaves, P. Traynor, and W. Lee, "The core of the matter: Analyzing malicious traffic in cellular carriers" in Proc. NDSS, 2013, vol. 13, pp. 1-16
-
(2013)
Proc. NDSS
, vol.13
, pp. 1-16
-
-
Lever, C.1
Antonakakis, M.2
Reaves, B.3
Traynor, P.4
Lee, W.5
-
63
-
-
84907413882
-
The company you keep: Mobile malware infection rates and inexpensive risk indicators
-
H. T. T. Truong et al., "The company you keep: Mobile malware infection rates and inexpensive risk indicators" in Proc. 23rd Int. Conf. WWW, 2013, pp. 39-50
-
(2013)
Proc. 23rd Int. Conf WWW
, pp. 39-50
-
-
Truong, H.T.T.1
-
64
-
-
84930507606
-
-
(Online; Last Accesed Dec 25 2013)
-
Carat: Collaborative Energy Diagnosis, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://carat.cs.berkeley.edu/
-
Carat: Collaborative Energy Diagnosis
-
-
-
65
-
-
84930503992
-
-
Fake Netxflix-Android trojan info stealer, (Online; Last Accessed Feb. 11)
-
Fake Netxflix-Android trojan info stealer, (Online; Last Accessed Feb. 11). [Online]. Available: http://contagiominidump.blogspot.in/2011/10/fake-netxflix-adtroid-Trojan-info.html
-
-
-
-
66
-
-
84901201584
-
-
National Univ. Comput. Emerging Sci., Islamabad, Pakistan
-
F. Shahzad, M. A. Akbar, and M. Farooq, "A survey on recent advances in malicious applications analysis and detection techniques for smartphones" National Univ. Comput. Emerging Sci., Islamabad, Pakistan
-
A Survey on Recent Advances in Malicious Applications Analysis and Detection Techniques for Smartphones
-
-
Shahzad, F.1
Akbar, M.A.2
Farooq, M.3
-
67
-
-
84930506782
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
Spitmo vs Zitmo: Banking Trojans Target Android, (Online; Last Accessed Feb. 11). [Online]. Available: https://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-Trojans-Target-android
-
Spitmo Vs Zitmo: Banking Trojans Target Android
-
-
-
68
-
-
84930508497
-
-
Fakedefender.B-Android Fake Antivirus (
-
Fakedefender.B-Android Fake Antivirus, (Online; Last Accesed Dec. 25, 2013). [Online]. Available: http://contagiominidump.blogspot. in/2013/11/fakedefenderb-android-fake-antivirus.html
-
Online; Last Accesed Dec 25 2013
-
-
-
69
-
-
84930507236
-
-
Avast! Free Mobile Security (Online; Last Accessed Dec 25 2013)
-
avast! Free Mobile Security, (Online; Last Accessed Dec. 25, 2013). [Online]. Available: http://www.avast.com/freemobile-security-c? utmexpid=22755838-21.bXJmQHnQA6pakUW6PaLQQ.2& utmreferrer=https%3A%2F%2Fwww.google.com%2F
-
-
-
-
71
-
-
84930508495
-
-
A. Inc Class to Dex Conversion with Dx, (Online; Last Accessed Mar 5 2013)
-
A. Inc., Class to Dex Conversion with Dx, (Online; Last Accessed Mar. 5, 2013). [Online]. Available: http://developer.android.com/tools/help/index.html
-
-
-
-
72
-
-
84930503640
-
-
(Online; Last Accessed Dec 25 2013)
-
Remote Access Tool Takes Aim with Android APK Binder, (Online; Last Accessed Dec. 25, 2013). [Online]. Available: http://www.symantec. com/connect/blogs/remote-access-Tool-Takes-aimandroid-apk-binder
-
Remote Access Tool Takes Aim with Android APK Binder
-
-
-
73
-
-
84878002579
-
Droidchameleon: Evaluating Android anti-malware against transformation attacks
-
Comput. Commun. Security
-
V. Rastogi, Y. Chen, and X. Jiang, "Droidchameleon: Evaluating Android anti-malware against transformation attacks" in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 329-334
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
74
-
-
84889078034
-
ADAM: An automatic and extensible platform to stress test Android anti-virus systems
-
M. Zheng, P. P. C. Lee, and J. C. S. Lui, "ADAM: An automatic and extensible platform to stress test Android anti-virus systems" in Proc. DIMVA, 2012, pp. 82-101
-
(2012)
Proc. DIMVA
, pp. 82-101
-
-
Zheng, M.1
Lee, P.P.C.2
Lui, J.C.S.3
-
75
-
-
84930507519
-
-
ProGuard, (Online; Last Accessed Feb. 11)
-
ProGuard, (Online; Last Accessed Feb. 11). [Online]. Available: http://proguard.sourceforge.net/
-
-
-
-
76
-
-
84930505153
-
-
DexGuard, (Online; Last Accessed Feb. 11). [Online]. Available:
-
DexGuard, (Online; Last Accessed Feb. 11). [Online]. Available: http://www.saikoa.com/dexguard
-
-
-
-
77
-
-
84923005881
-
Evaluation of android anti malware techniques against Dalvik bytecode obfuscation
-
Beijing, China, Sep 26-28
-
P. Faruki et al., "Evaluation of android anti malware techniques against Dalvik bytecode obfuscation" in Proc. 13th IEEE Int. Conf. TrustCom, Beijing, China, Sep. 26-28, 2014
-
(2014)
Proc. 13th IEEE Int. Conf. TrustCom
-
-
Faruki, P.1
-
78
-
-
84906992682
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
Dalvik Bytecode Obfuscation on Android, (Online; Last Accessed Feb. 11). [Online]. Available: https://dexlabs.org/blog/bytecode-obfuscation
-
Dalvik Bytecode Obfuscation on Android
-
-
-
79
-
-
84930507503
-
-
(Online; Accessed Mar 29 2013). [Online]. Available:
-
BlackHat, Reverse Engineering with Androguard, (Online; Accessed Mar. 29, 2013). [Online]. Available: https://code.google.com/androguard
-
BlackHat, Reverse Engineering with Androguard
-
-
-
80
-
-
84869439259
-
Hey, you get off my market: Detecting malicious apps in official and third party android markets
-
New York, NY, USA
-
W. Zhou, Y. Zhou, and X. Jiang, "Hey, you get off my market: Detecting malicious apps in official and third party android markets" in Proc. Annu. NDSS, New York, NY, USA, 2012, pp. 1-13
-
(2012)
Proc. Annu. NDSS
, pp. 1-13
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
-
81
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, "'Andromaly': A behavioral malware detection framework for android devices" J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161-190, 2012. [Online]. Available: http://dblp.uni-Trier.de/db/journals/jiis/jiis38.html#ShabtaiKEGW12
-
(2012)
J. Intell. Inf. Syst
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
82
-
-
84930506402
-
Apposcopy: Semanticsbased detection of android malware
-
Y. Feng, S. Anand, I. Dillig, and A. Aiken, "Apposcopy: Semanticsbased detection of android malware" in Proc. SIGSOFT FSE, 2014, pp. 1-12
-
(2014)
Proc. SIGSOFT FSE
, pp. 1-12
-
-
Feng, Y.1
Anand, S.2
Dillig, I.3
Aiken, A.4
-
83
-
-
84893307989
-
AndroSimilar: Robust statistical feature signature for Android malware detection
-
A. Eli M. S. Gaur, M. A. Orgun, and O. B. Makarevich, Eds
-
P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A. Bharmal, "AndroSimilar: Robust statistical feature signature for Android malware detection" in Proc. SIN, A. Eli, M. S. Gaur, M. A. Orgun, and O. B. Makarevich, Eds., 2013, pp. 152-159. [Online]. Available: http://dblp.uni-Trier.de/db/conf/sin/sin2013.html#FarukiGLGB13
-
(2013)
Proc. SIN
, pp. 152-159
-
-
Faruki, P.1
Ganmoor, V.2
Laxmi, V.3
Gaur, M.S.4
Bharmal, A.5
-
85
-
-
84869416020
-
CHEX: Statically vetting Android apps for component hijacking vulnerabilities
-
T. Yu, G. Danezis, and V. D. Gligor, Eds
-
L. Lu, Z. Li, Z.Wu,W. Lee, and G. Jiang, "CHEX: Statically vetting Android apps for component hijacking vulnerabilities" in Proc. ACM Conf. Comput. Commun. Security, T. Yu, G. Danezis, and V. D. Gligor, Eds., 2012, pp. 229-240. [Online]. Available: http://dblp.uni-Trier.de/db/conf/ccs/ccs2012.html#LuLWLJ12
-
(2012)
Proc ACM Conf. Comput. Commun. Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Lee Z.WuW.3
Jiang, G.4
-
86
-
-
84864033989
-
Android permissions: A perspective combining risks and benefits
-
B. P. Sarma et al., "Android permissions: A perspective combining risks and benefits" in Proc. 17th ACM Symp. Access ControlModels Technol., 2012, pp. 13-22
-
(2012)
Proc. 17th ACM Symp. Access ControlModels Technol
, pp. 13-22
-
-
Sarma, B.P.1
-
87
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android" in Proc. 17th ACM Conf. CCS, 2010, pp. 73-84
-
(2010)
Proc. 17th ACM Conf. CCS
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
88
-
-
84903829962
-
Performance evaluation on permission-based detection for android malware
-
C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu, "Performance evaluation on permission-based detection for android malware" in Proc. Adv. Intell. Syst. Appl.-Vol. 2, 2013, vol. 2, pp. 111-120
-
(2013)
Proc. Adv. Intell. Syst. Appl.-2
, vol.2
, pp. 111-120
-
-
Huang, C.-Y.1
Tsai, Y.-T.2
Hsu, C.-H.3
-
90
-
-
84930503890
-
ScanDal: Static analyzer for detecting privacy leaks in Android applications
-
IEEE Symposium on Security and Privacy
-
J. Kim, Y. Yoon, K. Yi, J. Shin, and S. Center, "ScanDal: Static analyzer for detecting privacy leaks in Android applications" in Proc. Workshop MoST, 2012, in conjunction with the IEEE Symposium on Security and Privacy
-
Proc. Workshop MoST 2012, in Conjunction with the
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
Center, S.5
-
91
-
-
84930503874
-
Study, formalisation, analysis of Dalvik bytecode
-
H. S. Karlsen, E. R. Wognsen, M. C. Olesen, and R. R. Hansen, "Study, formalisation, analysis of Dalvik bytecode" in Proc. 7th Workshop BYTECODE, 2012, pp. 1-9
-
(2012)
Proc. 7th Workshop BYTECODE
, pp. 1-9
-
-
Karlsen, H.S.1
Wognsen, E.R.2
Olesen, M.C.3
Hansen, R.R.4
-
92
-
-
85025148063
-
DroidAPIminer: Mining API-level features for robust malware detection in Android
-
T. Zia, A. Y. Zomaya, V. Varadharajan, and Z. M. Mao, Eds Springer
-
Y. Aafer, W. Du, and H. Yin, "DroidAPIminer: Mining API-level features for robust malware detection in Android" in Proc. SecureComm, vol. 127, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, T. Zia, A. Y. Zomaya, V. Varadharajan, and Z. M. Mao, Eds., Springer, 2013, pp. 86-103. [Online]. Available: http://dblp.uni-Trier.de/db/conf/securecomm/securecomm2013.html#AaferDY13
-
(2013)
Proc. SecureComm 127, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, pp. 86-103
-
-
Aafer, Y.1
Du, W.2
Yin, H.3
-
93
-
-
84893446426
-
DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware
-
M. Zheng, M. Sun, and J. C. S. Lui, "DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware" in Proc. 12th IEEE Int. Conf. TrustCom, 2013, pp. 163-171
-
(2013)
Proc. 12th IEEE Int. Conf. TrustCom
, pp. 163-171
-
-
Zheng, M.1
Sun, M.2
Lui, J.C.S.3
-
94
-
-
84930504646
-
-
Online; Last AccessedMar
-
JD-GUI, Android Decompiling with JD-GUI, (Online; Last AccessedMar. 1, 2014). [Online]. Available: http://java.decompiler.free.fr/? q=jdgui
-
(2014)
JD-GUI, Android Decompiling with JD-GUI
, vol.1
-
-
-
95
-
-
84930507556
-
-
JAD JAD Java Decompiler (Online; Last Accessed Mar 1 2014). [Online]. Available:
-
JAD, JAD Java Decompiler, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://varaneckas.com/jad/
-
-
-
-
96
-
-
84875679301
-
-
(Online; Last Accessed Mar 1 2014)
-
H. van Vliet, Mocha, The Java Decompiler, (Online; Last Accessed Mar. 1, 2014). [Online]. Available: http://www.brouhaha.com/-eric/software/mocha/
-
The Java Decompiler
-
-
Mocha Vliet H.Van1
-
97
-
-
84871271774
-
-
Online; Accessed Mar 1 2014)
-
SOOT, Soot: A Java optimization framework, (Online; Accessed Mar. 1, 2014). [Online]. Available: http://www.sable.mcgill.ca/soot/
-
SOOT Soot: A Java Optimization Framework
-
-
-
98
-
-
44949211954
-
-
(Online; Accessed Mar 1 2014)
-
WALA, T. J. Watson Libraries for Analysis (WALA), (Online; Accessed Mar. 1, 2014). [Online]. Available: http://wala.sourceforge.net/wiki/index.php/
-
Watson Libraries for Analysis (WALA)
-
-
Wala, T.J.1
-
99
-
-
85008234375
-
-
(Online; Accessed Mar 1 2014)
-
H. Inc., Fortify static code analyzer, (Online; Accessed Mar. 1, 2014). [Online]. Available: http://www8.hp.com/us/en/softwaresolutions/software.html?compURI=1338812
-
Fortify Static Code Analyzer
-
-
Inc, H.1
-
100
-
-
84930507405
-
A study of Android application security
-
San Francisco, CA, USA
-
E. William, O. Damien, M. Patrick, and C. Swarat, "A study of Android application security" in Proc. USENIX, San Francisco, CA, USA, 2011, p. 163
-
(2011)
Proc. USENIX
, pp. 163
-
-
William, E.1
Damien, O.2
Patrick, M.3
Swarat, C.4
-
102
-
-
84863492870
-
Dexpler: Converting Android Dalvik bytecode to Jimple for static analysis with Soot
-
A. Bartel, J. Klein, Y. Le Traon, and M. Monperrus, "Dexpler: Converting Android Dalvik bytecode to Jimple for static analysis with Soot" in Proc. ACM SIGPLAN Int. Workshop State Art Java Program Anal., 2012, pp. 27-38
-
(2012)
Proc ACM SIGPLAN Int. Workshop State Art Java Program Anal
, pp. 27-38
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
103
-
-
84863084209
-
Androidleaks: Automatically detecting potential privacy leaks in Android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen, "Androidleaks: Automatically detecting potential privacy leaks in Android applications on a large scale" in Proc. Trust Trustworthy Comput., 2012, pp. 291-307
-
(2012)
Proc. Trust Trustworthy Comput
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
104
-
-
84930504700
-
-
(Online; Last Accessed May 15 2013)
-
Dex2Jar, Android Decompiling with Dex2jar, (Online; Last Accessed May 15, 2013). [Online]. Available: http://code.google.com/p/dex2jar/
-
Dex2Jar, Android Decompiling with Dex2jar
-
-
-
105
-
-
84870819587
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
UI/Application Exercise Monkey, (Online; Last Accessed Feb. 11). [Online]. Available: http://developer.android.com/tools/help/monkey. html
-
UI/Application Exercise Monkey
-
-
-
106
-
-
84982804575
-
Evading android runtime analysis via sandbox detection
-
New York, NY, USA
-
T. Vidas and N. Christin, "Evading android runtime analysis via sandbox detection" in Proc. 9th ACM ASIA CCS, New York, NY, USA, 2014, pp. 447-458. [Online]. Available: http://doi.acm.org/10.1145/2590296. 2590325
-
(2014)
Proc. 9th ACM ASIA CCS
, pp. 447-458
-
-
Vidas, T.1
Christin, N.2
-
107
-
-
84930525327
-
A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors
-
A. Reina, A. Fattori, and L. Cavallaro, "A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors" in Proc. EUROSEC, Prague, Czech Republic
-
Proc. EUROSEC, Prague, Czech Republic
-
-
Reina, A.1
Fattori, A.2
Cavallaro, L.3
-
108
-
-
84900434211
-
The best of both worlds: A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
-
D. Damopoulos, G. Kambourakis, and G. Portokalidis, "The best of both worlds: A framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones" in Proc. 7th EuroSec, New York, NY, USA, 2014, pp. 6:1-6:6. [Online]. Available: http://doi.acm.org/10. 1145/2592791.2592797
-
(2014)
Proc. 7th EuroSec, New York, NY, USA
, pp. 61-66
-
-
Damopoulos, D.1
Kambourakis, G.2
Portokalidis, G.3
-
109
-
-
84930506033
-
TaintDroid: An information flow tracking system for realtime privacy monitoring on smartphones
-
E. William, G. Peter, C. Byunggon, and C. Landon, "TaintDroid: An information flow tracking system for realtime privacy monitoring on smartphones" in Proc. USENIX, 2011
-
(2011)
Proc. USENIX
-
-
William, E.1
Peter, G.2
Byunggon, C.3
Landon, C.4
-
111
-
-
84877931620
-
User-centric dependence analysis for identifying malicious mobile apps
-
K. O. Elish, D. (Daphne) Yao, and B. G. Ryder, "User-centric dependence analysis for identifying malicious mobile apps" in Proc. Workshop MoST, 2012
-
(2012)
Proc. Workshop MoST
-
-
Elish, K.O.1
Daphne Yao, D.2
Ryder, B.G.3
-
112
-
-
84994129817
-
AsDroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
-
J. Huang, X. Zhang, L. Tan, P.Wang, and B. Liang, "AsDroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction" in Proc. ICSE, 2014, pp. 1036-1046
-
(2014)
Proc. ICSE
, pp. 1036-1046
-
-
Huang, J.1
Zhang, X.2
Tan, L.3
Wang, P.4
Liang, B.5
-
113
-
-
85060493868
-
DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis
-
L. K. Yan and H. Yin, "DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis" in Proc. 21st USENIX Security Symp., 2012, p. 29
-
(2012)
Proc. 21st USENIX Security Symp
, pp. 29
-
-
Yan, L.K.1
Yin, H.2
-
115
-
-
84922670234
-
-
(Online; Last Accessed Feb 11 2013). [Online]. Available:
-
DARE: Dalvik Retargeting, (Online; Last Accessed Feb. 11, 2013). [Online]. Available: http://siis.cse.psu.edu/dare/
-
DARE: Dalvik Retargeting
-
-
-
116
-
-
84930506736
-
-
Dedexer, (Online; Last Accessed Feb 11 2013)
-
Dedexer, (Online; Last Accessed Feb. 11, 2013). [Online]. http://dedexer. sourceforge.net/
-
-
-
-
117
-
-
84930504947
-
-
JEB Decompiler (Online; Last Accessed Feb 11 2013). [Online]. Available:
-
JEB Decompiler, (Online; Last Accessed Feb. 11, 2013). [Online]. Available: http://www.android-decompiler.com/
-
-
-
-
118
-
-
84930503256
-
-
Similarities for Fun & Profit
-
Similarities for Fun & Profit
-
-
-
-
119
-
-
84869417986
-
Data fingerprinting with similarity hashes, advances in digital forensics
-
V. Roussev, "Data fingerprinting with similarity hashes, advances in digital forensics" in Proc. Int. Conf. Digit. Forensics, 2010, pp. 207-226
-
(2010)
Proc. Int. Conf. Digit. Forensics
, pp. 207-226
-
-
Roussev, V.1
-
120
-
-
78650760396
-
Building a better similarity trap with statistically improbable features
-
V. Roussev, "Building a better similarity trap with statistically improbable features" in Proc. 42nd HICSS, 2009, pp. 1-10
-
(2009)
Proc. 42nd HICSS
, pp. 1-10
-
-
Roussev, V.1
-
121
-
-
84930505409
-
-
Andrubis, 2012. [Online]. Available: http://anubis.iseclab.org/
-
(2012)
Andrubis
-
-
-
123
-
-
84930505882
-
-
APKInspector, 2013. [Online]. Available: https://github.com/honeynet/apkinspector/
-
(2013)
APKInspector
-
-
-
124
-
-
84930503335
-
-
(Online; Last Accessed Feb. 11). [Online]. Available:
-
ded: Decompiling Android Applications, (Online; Last Accessed Feb. 11). [Online]. Available: http://siis.cse.psu.edu/ded/
-
Ded: Decompiling Android Applications
-
-
-
125
-
-
85047887956
-
Aurasium: Practical policy enforcement for Android applications
-
USENIX Association
-
R. Xu, H. Saïdi, and R. Anderson, "Aurasium: Practical policy enforcement for Android applications" in Proc. 21st USENIX Conf. Security Symp., 2012, pp. 27-27, USENIX Association
-
(2012)
Proc. 21st USENIX Conf. Security Symp
, pp. 27-27
-
-
Xu, R.1
Saïdi, H.2
Anderson, R.3
-
126
-
-
84959369172
-
-
Feb
-
Google Bouncer: Bad guys may have an app for that, Feb. 2012. [Online]. Available: http://www.techrepublic.com/blog/it-security/google-bouncer-badguys-may-have-an-app-for-That/7422/
-
(2012)
Google Bouncer: Bad Guys May Have An App for That
-
-
-
127
-
-
84930504014
-
-
CopperDroid, Feb. 2012. [Online]. Available: http://copperdroid.isg. rhul.ac.uk/copperdroid/index.php
-
(2012)
CopperDroid Feb
-
-
-
128
-
-
33746191665
-
Identifying almost identical files using context triggered piecewise hashing
-
Sep
-
J. Kornblum, "Identifying almost identical files using context triggered piecewise hashing" Digit. Investigation, vol. 3, pp. 91-97, Sep. 2006. [Online]. Available: http://dx.doi.org/10.1016/j.diin.2006.06.015
-
(2006)
Digit. Investigation
, vol.3
, pp. 91-97
-
-
Kornblum, J.1
-
130
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
New York, NY, USA
-
M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, "Unsafe exposure analysis of mobile in-app advertisements" in Proc. 5th ACM Conf. WISEC, New York, NY, USA, 2012, pp. 101-112. [Online]. Available: http://doi.acm.org/10.1145/2185448.2185464
-
(2012)
Proc. 5th ACM Conf. WISEC
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
131
-
-
84903745241
-
Addetect: Automated detection of android ad libraries using semantic analysis
-
Singapore, Apr 21-24
-
A. Narayanan, L. Chen, and C. K. Chan, "Addetect: Automated detection of android ad libraries using semantic analysis" in Proc. IEEE 9th Int. Conf.ISSNIP, Singapore, Apr. 21-24, 2014, pp. 1-6. [Online]. Available: http://dx.doi.org/10.1109/ISSNIP.2014.6827639
-
(2014)
Proc IEEE 9th Int. Conf.ISSNIP
, pp. 1-6
-
-
Narayanan, A.1
Chen, L.2
Chan, C.K.3
-
132
-
-
84927778181
-
Android-based visual tag detection for visually impaired users: System design and testing
-
H. Dong, J. Kang, J. Schafer, and A. Ganz, "Android-based visual tag detection for visually impaired users: System design and testing" Int. J. E-Health Med. Commun., vol. 5, no. 1, pp. 63-80, 2014. [Online]. Available: http://dx.doi.org/10.4018/ijehmc.2014010104
-
(2014)
Int. J. E-Health Med. Commun
, vol.5
, Issue.1
, pp. 63-80
-
-
Dong, H.1
Kang, J.2
Schafer, J.3
Ganz, A.4
-
133
-
-
84930506639
-
Android platform invariant sandbox for analyzing malware and resource hogger apps
-
Beijing, China, Sep
-
P. Faruki, V. Ganmoor, L. Vijay, M. Gaur, and M. Conti, "Android Platform Invariant Sandbox for Analyzing Malware and Resource Hogger apps" in Proc. 10th IEEE Int. Conf. SecureComm, Beijing, China, Sep. 26-28, 2014, pp. 1-6
-
(2014)
Proc. 10th IEEE Int. Conf. SecureComm
, vol.26-28
, pp. 1-6
-
-
Faruki, P.1
Ganmoor, V.2
Vijay, L.3
Gaur, M.4
Conti, M.5
-
134
-
-
84906501609
-
Detecting targeted smartphone malware with behavior-Triggering stochastic models
-
G. Suarez-Tangil, M. Conti, J. E. Tapiador, and P. Peris-Lopez, "Detecting targeted smartphone malware with behavior-Triggering stochastic models" in Proc. Eur. Symp. Res. Comput. Security, 2014, pp. 183-201
-
(2014)
Proc. Eur. Symp. Res. Comput. Security
, pp. 183-201
-
-
Suarez-Tangil, G.1
Conti, M.2
Tapiador, J.E.3
Peris-Lopez, P.4
-
136
-
-
84930505807
-
Enter sandbox: Android sandbox comparison
-
S. Neuner et al., "Enter sandbox: Android sandbox comparison" in Proc. IEEE MoST, 2014
-
(2014)
Proc IEEE MoST
-
-
Neuner, S.1
-
137
-
-
84930503365
-
A systematic security evaluation of android's multiuser framework
-
P. Ratazzi et al., "A systematic security evaluation of android's multiuser framework" in Proc. IEEE MoST, 2014, pp. 1-10
-
(2014)
Proc IEEE MoST
, pp. 1-10
-
-
Ratazzi, P.1
-
138
-
-
84900413299
-
Rage against the virtual machine: Hindering dynamic analysis of android malware
-
Art. ID
-
T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis, "Rage against the virtual machine: Hindering dynamic analysis of android malware" in Proc. 7th Eur. Workshop Syst. Security, 2014, Art. ID. 5
-
(2014)
Proc. 7th Eur. Workshop Syst. Security
, pp. 5
-
-
Petsas, T.1
Voyatzis, G.2
Athanasopoulos, E.3
Polychronakis, M.4
Ioannidis, S.5
-
140
-
-
84968718794
-
Andrubis-1,000,000 apps later: A view on current Android malware behaviors
-
M. Lindorfer et al., "Andrubis-1,000,000 apps later: A view on current Android malware behaviors" in Proc. 3rd Int. Workshop BADGERS, 2014, pp. 1-15
-
(2014)
Proc. 3rd Int. Workshop BADGERS
, pp. 1-15
-
-
Lindorfer, M.1
-
141
-
-
84904090498
-
Andrubis: Android malware under the magnifying glass
-
Wien, Austria, Tech. Rep. TR-ISECLAB-
-
L.Weichselbaum et al., "Andrubis: Android malware under the magnifying glass" Vienna University of Technology, Wien, Austria, Tech. Rep. TR-ISECLAB-0414-001, 2014
-
(2014)
Vienna University of Technology
, pp. 0414-001
-
-
Weichselbaum, L.1
-
142
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
T. Bläsing, L. Batyuk, A.-D. Schmidt, S. A. Camtepe, and S. Albayrak, "An android application sandbox system for suspicious software detection" in Proc. MALWARE, 2010, pp. 55-62
-
(2010)
Proc. MALWARE
, pp. 55-62
-
-
Bläsing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.A.4
Albayrak, S.5
-
143
-
-
84869757378
-
SmartDroid: An automatic system for revealing UIbased trigger conditions in android applications
-
C. Zheng et al., "SmartDroid: An automatic system for revealing UIbased trigger conditions in android applications" in Proc. 2nd ACM Workshop SPSM, New York, NY, USA, 2012, pp. 93-104. [Online]. Available: http://doi.acm.org/10.1145/2381934.2381950
-
(2012)
Proc. 2nd ACM Workshop SPSM, New York, NY, USA
, pp. 93-104
-
-
Zheng, C.1
|