-
1
-
-
85178287263
-
DREBIN: Effective and explainable detection of android malware in your pocket
-
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck DREBIN: effective and explainable detection of android malware in your pocket Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA 2014
-
(2014)
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
2
-
-
84872113696
-
Efficient detection of split personalities in malware
-
D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna Efficient detection of split personalities in malware Proceedings of the Symposium on Network and Distributed System Security (NDSS), San Diego, CA 2010
-
(2010)
Proceedings of the Symposium on Network and Distributed System Security (NDSS), San Diego, CA
-
-
Balzarotti, D.1
Cova, M.2
Karlberger, C.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
3
-
-
85084096603
-
A view on current malware behaviors
-
USENIX Association Berkeley, CA, USA 8-8
-
U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel A view on current malware behaviors Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09 2009 USENIX Association Berkeley, CA, USA 8-8
-
(2009)
Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09
-
-
Bayer, U.1
Habibi, I.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
4
-
-
84873743297
-
Towards dynamic malware analysis to increase mobile device security
-
: A. Alkassar, J. H. Siekmann (Eds.) LNI, GI
-
Becher M, Freiling FC. Towards dynamic malware analysis to increase mobile device security, in: A. Alkassar, J. H. Siekmann (Eds.), Sicherheit, Vol. 128 of LNI, GI, pp. 423-433.
-
Sicherheit
, vol.128
, pp. 423-433
-
-
Becher, M.1
Freiling, F.C.2
-
7
-
-
78651410113
-
An Android application sandbox system for suspicious software detection
-
T. Bläsing, L. Batyuk, A.-D. Schmidt, S. Camtepe, and S. Albayrak An Android application sandbox system for suspicious software detection Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on 2010 55 62 10.1109/MALWARE.2010.5665792
-
(2010)
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on
, pp. 55-62
-
-
Bläsing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.4
Albayrak, S.5
-
8
-
-
79959861450
-
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders
-
ACM New York, NY, USA
-
E. Bodden, A. Sewe, J. Sinschek, H. Oueslati, and M. Mezini Taming reflection: aiding static analysis in the presence of reflection and custom class loaders Proceedings of the 33rd International Conference on Software Engineering, ICSE '11 2011 ACM New York, NY, USA 241 250 10.1145/1985793.1985827
-
(2011)
Proceedings of the 33rd International Conference on Software Engineering, ICSE '11
, pp. 241-250
-
-
Bodden, E.1
Sewe, A.2
Sinschek, J.3
Oueslati, H.4
Mezini, M.5
-
10
-
-
84888341014
-
Towards taming privilege-escalation attacks on Android
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry Towards taming privilege-escalation attacks on Android 19th Annual Network & Distributed System Security Symposium, NDSS '12 2012
-
(2012)
19th Annual Network & Distributed System Security Symposium, NDSS '12
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
11
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
X. Chen, J. Andersen, Z. Mao, M. Bailey, and J. Nazario Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on 2008 177 186 10.1109/DSN.2008.4630086
-
(2008)
Dependable Systems and Networks with FTCS and DCC, 2008. DSN 2008. IEEE International Conference on
, pp. 177-186
-
-
Chen, X.1
Andersen, J.2
Mao, Z.3
Bailey, M.4
Nazario, J.5
-
13
-
-
85037073388
-
Privilege escalation attacks on Android
-
Springer-Verlag Berlin, Heidelberg
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy Privilege escalation attacks on Android Proceedings of the 13th International Conference on Information Security, ISC'10 2011 Springer-Verlag Berlin, Heidelberg 346 360
-
(2011)
Proceedings of the 13th International Conference on Information Security, ISC'10
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
15
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association Berkeley, CA, USA
-
W. Enck, P. Gilbert, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, and et al. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10 2010 USENIX Association Berkeley, CA, USA 1 6
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
-
17
-
-
84889055128
-
Native code execution control for attack mitigation on Android
-
ACM New York, NY, USA
-
R. Fedler, M. Kulicke, and J. Schuette Native code execution control for attack mitigation on Android Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM '13 2013 ACM New York, NY, USA 15 20 10.1145/2516760.2516765
-
(2013)
Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM '13
, pp. 15-20
-
-
Fedler, R.1
Kulicke, M.2
Schuette, J.3
-
21
-
-
84877944138
-
On the effectiveness of api-level access control using bytecode rewriting in android
-
ACM New York, NY, USA
-
H. Hao, V. Singh, and W. Du On the effectiveness of api-level access control using bytecode rewriting in android Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS '13 2013 ACM New York, NY, USA 25 36 10.1145/2484313.2484317
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Asia CCS '13
, pp. 25-36
-
-
Hao, H.1
Singh, V.2
Du, W.3
-
22
-
-
84855669384
-
Barebox: Efficient malware analysis on bare-metal
-
ACM New York, NY, USA
-
D. Kirat, G. Vigna, and C. Kruegel Barebox: efficient malware analysis on bare-metal Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11 2011 ACM New York, NY, USA 403 412 10.1145/2076732.2076790
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11
, pp. 403-412
-
-
Kirat, D.1
Vigna, G.2
Kruegel, C.3
-
23
-
-
84857329765
-
Detecting environment-sensitive malware
-
Springer-Verlag Berlin, Heidelberg
-
M. Lindorfer, C. Kolbitsch, and P. Milani Comparetti Detecting environment-sensitive malware Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, RAID'11 2011 Springer-Verlag Berlin, Heidelberg 338 357
-
(2011)
Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, RAID'11
, pp. 338-357
-
-
Lindorfer, M.1
Kolbitsch, C.2
Milani Comparetti, P.3
-
26
-
-
84862909641
-
Attacks on WebView in the Android system
-
ACM New York, NY, USA
-
T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin Attacks on WebView in the Android system Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11 2011 ACM New York, NY, USA 343 352 10.1145/2076732.2076781
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11
, pp. 343-352
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
28
-
-
84872117493
-
Analysis of the communication between colluding applications on modern smartphones
-
ACM New York, NY, USA
-
C. Marforio, H. Ritzdorf, A. Francillon, and S. Capkun Analysis of the communication between colluding applications on modern smartphones Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12 2012 ACM New York, NY, USA 51 60
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12
, pp. 51-60
-
-
Marforio, C.1
Ritzdorf, H.2
Francillon, A.3
Capkun, S.4
-
31
-
-
84868107162
-
-
Presented at SummerCon 2012, Brooklyn, NY URL
-
J. Oberheide, and C. Miller Dissecting the Android Bouncer Presented at SummerCon 2012, Brooklyn, NY 2012 URL https://jon.oberheide.org/files/summercon12-bouncer.pdf
-
(2012)
Dissecting the Android Bouncer
-
-
Oberheide, J.1
Miller, C.2
-
32
-
-
84930154133
-
Adventures in bouncerland: Failures of automated malware detection with in mobile application markets
-
N.J. Percoco, and S. Schulte Adventures in bouncerland: failures of automated malware detection with in mobile application markets Black Hat USA '12, Trustwave SpiderLabs 2012
-
(2012)
Black Hat USA '12, Trustwave SpiderLabs
-
-
Percoco, N.J.1
Schulte, S.2
-
33
-
-
84900413299
-
Rage against the virtual machine: Hindering dynamic analysis of android malware
-
ACM New York, NY, USA
-
T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis Rage against the virtual machine: hindering dynamic analysis of android malware Proceedings of the Seventh European Workshop on System Security, EuroSec '14 2014 ACM New York, NY, USA 5:1 5:6 10.1145/2592791.2592796
-
(2014)
Proceedings of the Seventh European Workshop on System Security, EuroSec '14
, pp. 51-56
-
-
Petsas, T.1
Voyatzis, G.2
Athanasopoulos, E.3
Polychronakis, M.4
Ioannidis, S.5
-
34
-
-
84961583949
-
Execute this! Analyzing unsafe and malicious dynamic code loading in android applications
-
S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, and G. Vigna Execute this! Analyzing unsafe and malicious dynamic code loading in android applications Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA 2014
-
(2014)
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA
-
-
Poeplau, S.1
Fratantonio, Y.2
Bianchi, A.3
Kruegel, C.4
Vigna, G.5
-
36
-
-
38149030181
-
Detecting system emulators
-
Springer-Verlag Berlin, Heidelberg
-
T. Raffetseder, C. Kruegel, and E. Kirda Detecting system emulators Proceedings of the 10th International Conference on Information Security, ISC'07 2007 Springer-Verlag Berlin, Heidelberg 1 18
-
(2007)
Proceedings of the 10th International Conference on Information Security, ISC'07
, pp. 1-18
-
-
Raffetseder, T.1
Kruegel, C.2
Kirda, E.3
-
37
-
-
84878002579
-
Droidchameleon: Evaluating Android anti-malware against transformation attacks
-
ACM New York, NY, USA
-
V. Rastogi, Y. Chen, and X. Jiang Droidchameleon: evaluating Android anti-malware against transformation attacks Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS '13 2013 ACM New York, NY, USA 329 334 10.1145/2484313.2484355
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Asia CCS '13
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
38
-
-
77950675112
-
Google Android: A comprehensive security assessment
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer Google Android: a comprehensive security assessment IEEE Secur Priv 8 2 2010 35 44 10.1109/MSP.2010.2
-
(2010)
IEEE Secur Priv
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
39
-
-
84856225193
-
"andromaly": A behavioral malware detection framework for Android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss "Andromaly": a behavioral malware detection framework for Android devices J Intell Inf Syst 38 1 2012 161 190 10.1007/s10844-010-0148-x
-
(2012)
J Intell Inf Syst
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
40
-
-
84878001173
-
Mobile-sandbox: Having a deeper look into Android applications
-
ACM New York, NY, USA
-
M. Spreitzenbarth, F.C. Freiling, F. Echtler, T. Schreck, and J. Hoffmann Mobile-sandbox: having a deeper look into Android applications Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13 2013 ACM New York, NY, USA 1808 1815 10.1145/2480362.2480701
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13
, pp. 1808-1815
-
-
Spreitzenbarth, M.1
Freiling, F.C.2
Echtler, F.3
Schreck, T.4
Hoffmann, J.5
-
42
-
-
84863066873
-
Malware virtualization-resistant behavior detection
-
IEEE
-
M.-K. Sun, M.-J. Lin, M. Chang, C.-S. Laih, and H.-T. Lin Malware virtualization-resistant behavior detection ICPADS 2011 IEEE 912 917 10.1109/ICPADS.2011.78
-
(2011)
ICPADS
, pp. 912-917
-
-
Sun, M.-K.1
Lin, M.-J.2
Chang, M.3
Laih, C.-S.4
Lin, H.-T.5
-
43
-
-
79952157802
-
Soot - A Java bytecode optimization framework
-
IBM Press
-
Vallee-Rai R, Co P, Gagnon E, Hendren L, Lam P, Sundaresan V. Soot - a java bytecode optimization framework, In: Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research, CASCON '99, IBM Press.
-
Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research, CASCon '99
-
-
Vallee-Rai, R.1
Co, P.2
Gagnon, E.3
Hendren, L.4
Lam, P.5
Sundaresan, V.6
-
45
-
-
84982804575
-
Evading android runtime analysis via sandbox detection
-
ACM New York, NY, USA
-
T. Vidas, and N. Christin Evading android runtime analysis via sandbox detection Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14 2014 ACM New York, NY, USA 447 458 10.1145/2590296.2590325
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Asia CCS '14
, pp. 447-458
-
-
Vidas, T.1
Christin, N.2
-
46
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
C. Willems, T. Holz, and F.C. Freiling Toward automated dynamic malware analysis using cwsandbox IEEE Security and Privacy 5 2 2007 32 39 10.1109/MSP.2007.45
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.C.3
|