메뉴 건너뛰기




Volumn 21, Issue 1, 2016, Pages 114-123

Droiddetector: Android malware characterization and detection using deep learning

Author keywords

Android security; Association rules mining; characterization; deep learning; malware detection

Indexed keywords

ANDROID (OPERATING SYSTEM); ARTIFICIAL INTELLIGENCE; CHARACTERIZATION; COMPUTER CRIME; LEARNING ALGORITHMS; LEARNING SYSTEMS; MALWARE; STATIC ANALYSIS; VIRUSES;

EID: 84958531554     PISSN: 10070214     EISSN: 18787606     Source Type: Journal    
DOI: 10.1109/TST.2016.7399288     Document Type: Article
Times cited : (422)

References (34)
  • 4
    • 84958542725 scopus 로고    scopus 로고
    • McAfee
    • McAfee, McAfee labs threats report, http://www. mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2013.pdf, 2015.
    • (2015) McAfee Labs Threats Report
  • 5
    • 84891843335 scopus 로고    scopus 로고
    • Delegate the smartphone user? Security awareness in smartphone platforms
    • A. Mylonas, A. Kastania, D. Gritzalis, Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol. 34, pp. 47-66, 2013.
    • (2013) Computers & Security , vol.34 , pp. 47-66
    • Mylonas, A.1    Kastania, A.2    Gritzalis, D.3
  • 6
    • 84901234193 scopus 로고    scopus 로고
    • Permission based android Security: Issues and countermeasures
    • Z. Fang, W. Han, Y. Li, Permission based Android security: Issues and countermeasures, Computers & Security, vol. 43, pp. 205-218, 2014.
    • (2014) Computers & Security , vol.43 , pp. 205-218
    • Fang, Z.1    Han, W.2    Li, Y.3
  • 7
    • 84897726157 scopus 로고    scopus 로고
    • Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining
    • J. Xu, Y.-T. Yu, Z. Chen, B. Cao, W. Dong, Y. Guo, J. Cao, Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining, Tsinghua Science and Technology, vol. 18, no. 4, pp. 418-427, 2013.
    • (2013) Tsinghua Science and Technology , vol.18 , Issue.4 , pp. 418-427
    • Xu, J.1    Yu, Y.-T.2    Chen, Z.3    Cao, B.4    Dong, W.5    Guo, Y.6    Cao, J.7
  • 10
    • 84923259697 scopus 로고    scopus 로고
    • A permission verification approach for Android mobile applications
    • D. Geneiatakis, I. N. Fovino, I. Kounelis, P. Stirparo, A permission verification approach for Android mobile applications, Computers & Security, vol. 49, pp. 192-205, 2015.
    • (2015) Computers & Security , vol.49 , pp. 192-205
    • Geneiatakis, D.1    Fovino, I.N.2    Kounelis, I.3    Stirparo, P.4
  • 27
    • 84958583878 scopus 로고    scopus 로고
    • DroidBox: An Android application sandbox for dynamic analysis
    • DroidBox: An Android application sandbox for dynamic analysis, http://www.honeynet.org/gsoc2011/slot5, 2015.
    • (2015)
  • 29
    • 85039829310 scopus 로고    scopus 로고
    • Bouncer: Android and security
    • Bouncer: Android and security, http://googlemobile. blogspot.com/2012/02/android-and-security.html, 2015.
    • (2015)
  • 30
    • 0007425929 scopus 로고    scopus 로고
    • Bump hunting in highdimensional data
    • J. H. Friedman and N. I. Fisher, Bump hunting in highdimensional data, Statistics and Computing, vol. 9, no. 2, pp. 123-143, 1999.
    • (1999) Statistics and Computing , vol.9 , Issue.2 , pp. 123-143
    • Friedman, J.H.1    Fisher, N.I.2
  • 31
    • 84892142922 scopus 로고    scopus 로고
    • The learning machines
    • N. Jones, The learning machines, Nature, vol. 505, pp. 146-148, 2014.
    • Nature , vol.505 , Issue.2014 , pp. 146-148
    • Jones, N.1
  • 33
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis
    • L.-K. Yan and H. Yin, Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis, in Proceedings of the 21st USENIX Security Symposium (USENIX Security), 2012, pp. 569-584.
    • (2012) Proceedings of the 21st USENIX Security Symposium (USENIX Security) , pp. 569-584
    • Yan, L.-K.1    Yin, H.2
  • 34
    • 84923250812 scopus 로고    scopus 로고
    • Profiling user-trigger dependence for Android malware detection
    • K. O. Elish, X. Shu, D. D. Yao, B. G. Ryder, X. Jiang, Profiling user-trigger dependence for Android malware detection, Computers & Security, vol. 49, pp. 255-273, 2015.
    • (2015) Computers & Security , vol.49 , pp. 255-273
    • Elish, K.O.1    Shu, X.2    Yao, D.D.3    Ryder, B.G.4    Jiang, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.