-
1
-
-
84961655886
-
-
last visit 20 April
-
On the effectiveness of malware protection on android. http://www. aisec. fraunhofer. de/content/dam/aisec/Dokumente/Publikationen/Studien TechReports/deutsch/042013-Technical-Report-Android-Virus-Test. pdf, last visit 20 April 2015.
-
(2015)
On the Effectiveness of Malware Protection on Android
-
-
-
2
-
-
84961655885
-
-
Mobile threat report, last visit 20 April
-
Mobile threat report. https: //www. f-secure. com/documents/996508/1030743/Threat Report H1 2014. pdf, last visit 20 April 2015.
-
(2015)
-
-
-
4
-
-
84961678144
-
-
Smartphone os market share, q3 2014, last visit 20 April
-
Smartphone os market share, q3 2014. http://www. idc. com/prodserv/smartphone-osmarket-share. jsp, last visit 20 April 2015.
-
(2015)
-
-
-
6
-
-
84947593645
-
-
last visit 20 April
-
Google play. https: //play. google. com/store?hl=it, last visit 20 April 2015.
-
(2015)
Google Play
-
-
-
7
-
-
84961668876
-
-
last visit 20 April
-
Gartner. http://www. gartner. com/newsroom/id/2944819, last visit 20 April 2015.
-
(2015)
-
-
-
8
-
-
84961604210
-
-
Kindsight security labs malware report-q4 2013, last visit 21 January
-
Kindsight security labs malware report-q4 2013. http://www. tmcnet. com/tmc/whitepapers/documents/whitepapers/2014/9861-kindsight-security-labsmalware-report-q4-2013. pdf, last visit 21 January 2015.
-
(2015)
-
-
-
9
-
-
84959304838
-
-
last visit 25 November
-
Google play unofficial python api. https: //github. com/egirault/googleplay-api, last visit 25 November 2014.
-
(2014)
Google Play Unofficial Python Api
-
-
-
10
-
-
84961591720
-
-
last visit 25 November
-
Virustotal. https: //www. virustotal. com/, last visit 25 November 2014.
-
(2014)
-
-
-
11
-
-
85178287263
-
Drebin: Efficient and explainable detection of android malware in your pocket
-
Daniel Arp, Michael Spreitzenbarth, Malte Huebner, Hugo Gascon, and Konrad Rieck. Drebin: Efficient and explainable detection of android malware in your pocket. In Proceedings of 21th Annual Network and Distributed System Security Symposium (NDSS), 2014.
-
(2014)
Proceedings of 21th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Huebner, M.3
Gascon, H.4
Rieck, K.5
-
12
-
-
84921709974
-
Compressing regular expression sets for deep packet inspection
-
Springer
-
Alberto Bartoli, Simone Cumar, Andrea De Lorenzo, and Eric Medvet. Compressing regular expression sets for deep packet inspection. In Parallel Problem Solving from Nature-PPSN XIII, pages 394-403. Springer, 2014.
-
(2014)
Parallel Problem Solving from Nature-PPSN XIII
, pp. 394-403
-
-
Bartoli, A.1
Cumar, S.2
De Lorenzo, A.3
Medvet, E.4
-
15
-
-
84892410673
-
A classifier of malicious android applications
-
Gerardo Canfora, Francesco Mercaldo, and Corrado Aaron Visaggio. A classifier of malicious android applications. In Proceedings of the 2nd International Workshop on Security of Mobile Applications, in conjunction with the International Conference on Availability, Reliability and Security, 2013.
-
(2013)
Proceedings of the 2nd International Workshop on Security of Mobile Applications, in Conjunction with the International Conference on Availability, Reliability and Security
-
-
Canfora, G.1
Mercaldo, F.2
Aaron Visaggio, C.3
-
17
-
-
84893307989
-
Androsimilar: Robust statistical feature signature for android malware detection
-
Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, M. S. Gaur, and Ammar Bharmal. Androsimilar: robust statistical feature signature for android malware detection. In International Conference on Security of Information and Networks, pages 151-159, 2013.
-
(2013)
International Conference on Security of Information and Networks
, pp. 151-159
-
-
Faruki, P.1
Ganmoor, V.2
Laxmi, V.3
Gaur, M.S.4
Bharmal, A.5
-
19
-
-
84986888961
-
Apposcopy: Semantics-based detection of android malware through static analysis
-
Yu Feng, Saswat Anand, Isil Dillig, and Alex Aiken. Apposcopy: semantics-based detection of android malware through static analysis. In ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 576-587, 2014.
-
(2014)
ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 576-587
-
-
Feng, Y.1
Anand, S.2
Dillig, I.3
Aiken, A.4
-
20
-
-
84919773193
-
Do we need hundreds of classifiers to solve real world classification problems
-
Manuel Fernández-Delgado, Eva Cernadas, Senén Barro, and Dinani Amorim. Do we need hundreds of classifiers to solve real world classification problems? The Journal of Machine Learning Research, 15 (1): 3133-3181, 2014.
-
(2014)
The Journal of Machine Learning Research
, vol.15
, Issue.1
, pp. 3133-3181
-
-
Fernández-Delgado, M.1
Cernadas, E.2
Barro, S.3
Amorim, D.4
-
22
-
-
84906994678
-
Using opcode-sequences to detect malicious android applications
-
Q. Jerome, K. Allix, R. State, and T. Engel. Using opcode-sequences to detect malicious android applications. In IEEE International Conference on Communication and Information Systems Security Symposium, pages 914-919, 2014.
-
(2014)
IEEE International Conference on Communication and Information Systems Security Symposium
, pp. 914-919
-
-
Jerome, Q.1
Allix, K.2
State, R.3
Engel, T.4
-
23
-
-
84907004612
-
Permissioncombination-based scheme for android mobile malware detection
-
Shuang Liang and Xiaojiang Du. Permissioncombination-based scheme for android mobile malware detection. In International Conference on Communications, pages 2301-2306, 2014.
-
(2014)
International Conference on Communications
, pp. 2301-2306
-
-
Liang, S.1
Du, X.2
-
28
-
-
85019170256
-
Whyper: Towards automating risk assessment of mobile applications
-
R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie. Whyper: Towards automating risk assessment of mobile applications. In 22nd USENIX Security Symposium, pages 527-542, 2013.
-
(2013)
22nd USENIX Security Symposium
, pp. 527-542
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
29
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In CCS'12, 19th ACM Conference on Computer and Communications Security, pp. 241-252, 2012.
-
(2012)
CCS'12, 19th ACM Conference on Computer and Communications Security
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
30
-
-
84910606183
-
Autocog: Measuring the description-to-permission fidelity in android applications
-
Z. Qu, V. Rastogi, X. Zhang, and Y. Chen. Autocog: Measuring the description-to-permission fidelity in android applications. In 21st ACM Conference on Computer and Communications Security, pages 1354-1365, 2014.
-
(2014)
21st ACM Conference on Computer and Communications Security
, pp. 1354-1365
-
-
Qu, Z.1
Rastogi, V.2
Zhang, X.3
Chen, Y.4
-
31
-
-
79958756129
-
Metamorphic virus variants classification using opcode frequency histogram
-
B. B. Rad and M. Masrom. Metamorphic Virus Variants Classification Using Opcode Frequency Histogram. Latest Trends on Computers (Volume I), 2010.
-
(2010)
Latest Trends on Computers
, vol.1
-
-
Rad, B.B.1
Masrom, M.2
-
34
-
-
84878002579
-
Droidchameleon: Evaluating android anti-malware against transformation attacks
-
May
-
Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. Droidchameleon: evaluating android anti-malware against transformation attacks. In ACM Symposium on Information, Computer and Communications Security, pages 329-334, May 2013.
-
(2013)
ACM Symposium on Information, Computer and Communications Security
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
35
-
-
74549138307
-
N-grams-based file signatures for malware detection
-
I. Santos, Y. K. Penya, J. Devesa, and P. G. Bringas. N-grams-based file signatures for malware detection. In International Conference on Enterprise Information Systems (ICEIS), pages 317-320, 2009.
-
(2009)
International Conference on Enterprise Information Systems (ICEIS)
, pp. 317-320
-
-
Santos, I.1
Penya, Y.K.2
Devesa, J.3
Bringas, P.G.4
-
36
-
-
84864033989
-
Android permissions: A perspective combining risks and benefits
-
B. Sarma, N. Li, C. Gates, R. Potharaju, and C. Nita-Rotaru. Android permissions: A perspective combining risks and benefits. In SACMAT'12, Symposium on Access Models and Technologies, pp. 13-22, 2012.
-
(2012)
SACMAT'12 Symposium on Access Models and Technologies
, pp. 13-22
-
-
Sarma, B.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
-
37
-
-
84939128749
-
Mobilesandbox: Looking deeper into android applications
-
Michael Spreitzenbarth, Florian Echtler, Thomas Schreck, Felix C. Freling, and Johannes Hoffmann. Mobilesandbox: Looking deeper into android applications. In 28th International ACM Symposium on Applied Computing (SAC), 2013.
-
(2013)
28th International ACM Symposium on Applied Computing (SAC)
-
-
Spreitzenbarth, M.1
Echtler, F.2
Schreck, T.3
Freling, F.C.4
Hoffmann, J.5
-
38
-
-
84910005301
-
Droiddolphin: A dynamic android malware detection framework using big data and machine learning
-
Wen-Chieh Wu and Shih-Hao Hung. Droiddolphin: a dynamic android malware detection framework using big data and machine learning. In Conference on Research in Adaptive and Convergent Systems, pages 247-252, 2014.
-
(2014)
Conference on Research in Adaptive and Convergent Systems
, pp. 247-252
-
-
Wu, W.1
Hung, S.2
-
39
-
-
84881033715
-
A new android malware detection approach using Bayesian classification
-
Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, and Igor Muttik. A new android malware detection approach using bayesian classification. In International Conference on Advanced Information Networking and Applications, pages 121-128, 2013.
-
(2013)
International Conference on Advanced Information Networking and Applications
, pp. 121-128
-
-
Yerima, S.Y.1
Sezer, S.2
McWilliams, G.3
Muttik, I.4
|