-
2
-
-
85084161115
-
All your droid are belong to us: A survey of current Android attacks
-
T. Vidas, D. Votipka, N. Christin, All your droid are belong to us: A survey of current Android attacks, in Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT), 2011, pp. 81-90.
-
(2011)
Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT)
, pp. 81-90
-
-
Vidas, T.1
Votipka, D.2
Christin, N.3
-
3
-
-
80755181021
-
A survey of mobile malware in the wild in Proceedings of the 1st
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 3-14.
-
(2011)
ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
4
-
-
84958542725
-
-
McAfee
-
McAfee, McAfee labs threats report, http://www. mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2013.pdf, 2015.
-
(2015)
McAfee Labs Threats Report
-
-
-
5
-
-
84891843335
-
Delegate the smartphone user? Security awareness in smartphone platforms
-
A. Mylonas, A. Kastania, D. Gritzalis, Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol. 34, pp. 47-66, 2013.
-
(2013)
Computers & Security
, vol.34
, pp. 47-66
-
-
Mylonas, A.1
Kastania, A.2
Gritzalis, D.3
-
6
-
-
84901234193
-
Permission based android Security: Issues and countermeasures
-
Z. Fang, W. Han, Y. Li, Permission based Android security: Issues and countermeasures, Computers & Security, vol. 43, pp. 205-218, 2014.
-
(2014)
Computers & Security
, vol.43
, pp. 205-218
-
-
Fang, Z.1
Han, W.2
Li, Y.3
-
7
-
-
84897726157
-
Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining
-
J. Xu, Y.-T. Yu, Z. Chen, B. Cao, W. Dong, Y. Guo, J. Cao, Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining, Tsinghua Science and Technology, vol. 18, no. 4, pp. 418-427, 2013.
-
(2013)
Tsinghua Science and Technology
, vol.18
, Issue.4
, pp. 418-427
-
-
Xu, J.1
Yu, Y.-T.2
Chen, Z.3
Cao, B.4
Dong, W.5
Guo, Y.6
Cao, J.7
-
8
-
-
85019170256
-
Whyper: Towards automating risk assessment of mobile applications
-
R. Pandita, X. Xiao, W. Yang, W. Enck, T. Xie, Whyper: Towards automating risk assessment of mobile applications, in Proceedings of the 22nd USENIX Security Symposium (USENIX Security), 2013, pp. 527-542.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium (USENIX Security)
, pp. 527-542
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
9
-
-
84910606183
-
Autocog: Measuring the description-to-permission fidelity in Android applications
-
Z. Qu, V. Rastogi, X. Zhang, Y. Chen, T. Zhu, Z. Chen, Autocog: Measuring the description-to-permission fidelity in Android applications, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014, pp. 1354-1365.
-
(2014)
Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS)
, pp. 1354-1365
-
-
Qu, Z.1
Rastogi, V.2
Zhang, X.3
Chen, Y.4
Zhu, T.5
Chen, Z.6
-
10
-
-
84923259697
-
A permission verification approach for Android mobile applications
-
D. Geneiatakis, I. N. Fovino, I. Kounelis, P. Stirparo, A permission verification approach for Android mobile applications, Computers & Security, vol. 49, pp. 192-205, 2015.
-
(2015)
Computers & Security
, vol.49
, pp. 192-205
-
-
Geneiatakis, D.1
Fovino, I.N.2
Kounelis, I.3
Stirparo, P.4
-
11
-
-
85172622386
-
Hey You Get off of my market: Detecting malicious apps in official and alternative Android markets
-
Y. Zhou, Z. Wang, W. Zhou, X. Jiang, Hey, You, Get off of my market: Detecting malicious apps in official and alternative Android markets, in Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS), 2012.
-
(2012)
Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
12
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day Android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, X. Jiang, Riskranker: Scalable and accurate zero-day Android malware detection, in Proceedings of the 10th International Conference on Mobile Systems, Applications, Services (MobiSys), 2012, pp. 281-294.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, Services (MobiSys)
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
13
-
-
84878002579
-
Droidchameleon: Evaluating Android anti-malware against transformation attacks
-
V. Rastogi, Y. Chen, X. Jiang, Droidchameleon: Evaluating Android anti-malware against transformation attacks, in Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIA CCS), 2013, pp. 329-334.
-
(2013)
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (Asia CCS)
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
14
-
-
84860660623
-
Unsafe exposure analysis of mobile in-app advertisements
-
M. C. Grace, W. Zhou, X. Jiang, A.-R. Sadeghi, Unsafe exposure analysis of mobile in-app advertisements, in Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2012, pp. 101-112.
-
(2012)
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
, pp. 101-112
-
-
Grace, M.C.1
Zhou, W.2
Jiang, X.3
Sadeghi, A.-R.4
-
15
-
-
84961583949
-
Execute this! Analyzing unsafe and malicious dynamic code loading in Android applications
-
S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, G. Vigna, Execute this! Analyzing unsafe and malicious dynamic code loading in Android applications, in Proceedings of the 21th Annual Symposium on Network and Distributed System Security (NDSS), 2014.
-
(2014)
Proceedings of the 21th Annual Symposium on Network and Distributed System Security (NDSS)
-
-
Poeplau, S.1
Fratantonio, Y.2
Bianchi, A.3
Kruegel, C.4
Vigna, G.5
-
17
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to Android in Proceedings of the 17th
-
D. Barrera, H. G. Kayacik, P. C. van Oorschot, A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to Android, in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 2010, pp. 73-84.
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
18
-
-
85025148063
-
Droidapiminer: Mining apilevel features for robust malware detection in Android
-
Y. Aafer, W. Du, H. Yin, Droidapiminer: Mining apilevel features for robust malware detection in Android, in Proceedinds of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm), 2013, pp. 86-103.
-
(2013)
Proceedinds of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm)
, pp. 86-103
-
-
Aafer, Y.1
Du, W.2
Yin, H.3
-
19
-
-
85178287263
-
Drebin: Effective and explainable detection of Android malware in your pocket
-
D. Arp, M. Spreitzenbarth, M. Hbner, H. Gascon, K. Rieck, C. Siemens, Drebin: Effective and explainable detection of Android malware in your pocket, in Proceedings of the 21th Annual Symposium on Network and Distributed System Security (NDSS), 2014.
-
(2014)
Proceedings of the 21th Annual Symposium on Network and Distributed System Security (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hbner, M.3
Gascon, H.4
Rieck, K.5
Siemens, C.6
-
20
-
-
84910677667
-
Semantics-aware Android malware classification using weighted contextual api dependency graphs
-
M. Zhang, Y. Duan, H. Yin, Z. Zhao, Semantics-aware Android malware classification using weighted contextual api dependency graphs, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014, pp. 1105-1116.
-
(2014)
Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS)
, pp. 1105-1116
-
-
Zhang, M.1
Duan, Y.2
Yin, H.3
Zhao, Z.4
-
21
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for Android
-
I. Burguera, U. Zurutuza, S. Nadjm-Tehrani, Crowdroid: Behavior-based malware detection system for Android, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 15-26.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
22
-
-
69349090197
-
Learning deep architectures for ai
-
Y. Bengio, Learning deep architectures for ai, Foundations and Trends in Machine Learning, vol. 2, no. 1, pp. 1-127, 2009.
-
(2009)
Foundations and Trends in Machine Learning
, vol.2
, Issue.1
, pp. 1-127
-
-
Bengio, Y.1
-
23
-
-
84907310376
-
Droid-sec: Deep learning in android malware detection
-
Z. Yuan, Y. Lu, Z. Wang, Y. Xue, Droid-sec: Deep learning in Android malware detection, in Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication (SIGCOMM, poster), 2014, pp. 371-372.
-
(2014)
Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication (SIGCOMM, Poster)
, pp. 371-372
-
-
Yuan, Z.1
Lu, Y.2
Wang, Z.3
Xue, Y.4
-
27
-
-
84958583878
-
-
DroidBox: An Android application sandbox for dynamic analysis
-
DroidBox: An Android application sandbox for dynamic analysis, http://www.honeynet.org/gsoc2011/slot5, 2015.
-
(2015)
-
-
-
28
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, A. Sheth, Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones, in Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
29
-
-
85039829310
-
-
Bouncer: Android and security
-
Bouncer: Android and security, http://googlemobile. blogspot.com/2012/02/android-and-security.html, 2015.
-
(2015)
-
-
-
30
-
-
0007425929
-
Bump hunting in highdimensional data
-
J. H. Friedman and N. I. Fisher, Bump hunting in highdimensional data, Statistics and Computing, vol. 9, no. 2, pp. 123-143, 1999.
-
(1999)
Statistics and Computing
, vol.9
, Issue.2
, pp. 123-143
-
-
Friedman, J.H.1
Fisher, N.I.2
-
31
-
-
84892142922
-
The learning machines
-
N. Jones, The learning machines, Nature, vol. 505, pp. 146-148, 2014.
-
Nature
, vol.505
, Issue.2014
, pp. 146-148
-
-
Jones, N.1
-
32
-
-
84866608644
-
Profiledroid: Multi-layer profiling of Android applications
-
X. Wei, L. Gomez, I. Neamtiu, M. Faloutsos, Profiledroid: Multi-layer profiling of Android applications, in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom), 2012, pp. 137-148.
-
(2012)
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 137-148
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
33
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis
-
L.-K. Yan and H. Yin, Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis, in Proceedings of the 21st USENIX Security Symposium (USENIX Security), 2012, pp. 569-584.
-
(2012)
Proceedings of the 21st USENIX Security Symposium (USENIX Security)
, pp. 569-584
-
-
Yan, L.-K.1
Yin, H.2
-
34
-
-
84923250812
-
Profiling user-trigger dependence for Android malware detection
-
K. O. Elish, X. Shu, D. D. Yao, B. G. Ryder, X. Jiang, Profiling user-trigger dependence for Android malware detection, Computers & Security, vol. 49, pp. 255-273, 2015.
-
(2015)
Computers & Security
, vol.49
, pp. 255-273
-
-
Elish, K.O.1
Shu, X.2
Yao, D.D.3
Ryder, B.G.4
Jiang, X.5
|