-
3
-
-
84904098536
-
-
F-Secure, "Threat Report H2 2013," http://www.f-secure.com/static/doc/ labs global/Research/Threat Report H2 2013.pdf, 2014
-
(2014)
Threat Report H2 2013
-
-
-
4
-
-
84904132408
-
AndRadar: Fast discovery of android applications in alternative markets
-
M. Lindorfer, S. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, C. Platzer, S. Zanero, and S. Ioannidis, "AndRadar: fast discovery of android applications in alternative markets," in Conference on Detection of Intrusions and Malware &Vulnerability Assessment (DIMVA), 2014
-
(2014)
Conference on Detection of Intrusions and Malware &Vulnerability Assessment (DIMVA)
-
-
Lindorfer, M.1
Volanis, S.2
Sisto, A.3
Neugschwandtner, M.4
Athanasopoulos, E.5
Maggi, F.6
Platzer, C.7
Zanero, S.8
Ioannidis, S.9
-
14
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, "Android permissions: User attention, comprehension, and behavior," in Symposium on Usable Privacy and Security (SOUPS), 2012
-
(2012)
Symposium on Usable Privacy and Security (SOUPS)
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
15
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
J. Cheng, S. H. Wong, H. Yang, and S. Lu, "SmartSiren: Virus Detection and Alert for Smartphones," in International Conference on Mobile Systems, Applications, and Services (MobiSys), 2007
-
(2007)
International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
16
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized In-cloud Security Services for Mobile Devices," in Workshop on Virtualization in Mobile Computing (MobiVirt), 2008
-
(2008)
Workshop on Virtualization in Mobile Computing (MobiVirt)
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
18
-
-
84968718794
-
Andrubis-1,000,000 apps later: A view on current android malware behaviors
-
M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, and C. Platzer, "Andrubis-1,000,000 Apps Later: A View on Current Android Malware Behaviors," in International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014
-
(2014)
International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
-
-
Lindorfer, M.1
Neugschwandtner, M.2
Weichselbaum, L.3
Fratantonio, Y.4
Vander Veen, V.5
Platzer, C.6
-
19
-
-
58149084148
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario, "Automated Classification and Analysis of Internet Malware," in International Symposium on Recent Advances in Intrusion Detection (RAID), 2007
-
(2007)
International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
20
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Milani Comparetti, C. Hlauscheck, C. Kruegel, and E. Kirda, "Scalable, Behavior-Based Malware Clustering," in Annual Network &Distributed System Security Symposium (NDSS), 2009
-
(2009)
Annual Network &Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Milani Comparetti, P.2
Hlauscheck, C.3
Kruegel, C.4
Kirda, E.5
-
21
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov, "Learning and Classification of Malware Behavior," in Conference on Detection of Intrusions and Malware &Vulnerability Assessment (DIMVA), 2008
-
(2008)
Conference on Detection of Intrusions and Malware &Vulnerability Assessment (DIMVA)
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
22
-
-
84855671047
-
ForeCast: Skimming off the malware cream
-
M. Neugschwandtner, P. Milani Comparetti, G. Jacob, and C. Kruegel, "ForeCast: Skimming off the Malware Cream," in Annual Computer Security Applications Conference (ACSAC), 2011
-
(2011)
Annual Computer Security Applications Conference (ACSAC)
-
-
Neugschwandtner, M.1
Milani Comparetti, P.2
Jacob, G.3
Kruegel, C.4
-
23
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid Android: Versatile Protection for Smartphones," in Annual Computer Security Applications Conference (ACSAC), 2010
-
(2010)
Annual Computer Security Applications Conference (ACSAC)
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
25
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Using Probabilistic Generative Models For Ranking Risks of Android Apps," in ACM Conference on Computer and Communications Security (CCS), 2012
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
27
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A Survey of Mobile Malware in the Wild," in ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011
-
(2011)
ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
29
-
-
84869797921
-
Understanding and improving app installation security mechanisms through empirical analysis of android
-
D. Barrera, J. Clark, D. McCarney, and P. C. van Oorschot, "Understanding and Improving App Installation Security Mechanisms Through Empirical Analysis of Android," in ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2012
-
(2012)
ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Barrera, D.1
Clark, J.2
McCarney, D.3
Van Oorschot, P.C.4
-
30
-
-
84860619315
-
Reducing the window of opportunity for android malware: Gotta catch 'em all
-
A. Apvrille and T. Strazzere, "Reducing the Window of Opportunity for Android Malware: Gotta catch 'em all," Journal in Computer Virology, vol. 8, no. 1-2, pp. 61-71, 2012
-
(2012)
Journal in Computer Virology
, vol.8
, Issue.1-2
, pp. 61-71
-
-
Apvrille, A.1
Strazzere, T.2
-
31
-
-
84879543890
-
MAST: Triage for market-scale mobile malware analysis
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck, "MAST: Triage for Market-scale Mobile Malware Analysis," in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2013
-
(2013)
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
32
-
-
84907029498
-
Mobile app recommendations with security and privacy awareness
-
H. Zhu, H. Xiong, Y. Ge, and E. Chen, "Mobile App Recommendations with Security and Privacy Awareness," in ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2014
-
(2014)
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
-
-
Zhu, H.1
Xiong, H.2
Ge, Y.3
Chen, E.4
-
33
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "RiskRanker: Scalable and Accurate Zero-day Android Malware Detection," in International Conference on Mobile Systems, Applications, and Services (MobiSys), 2012
-
(2012)
International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
35
-
-
85178287263
-
Drebin: Efficient and explainable detection of android malware in your pocket
-
D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, and K. Rieck, "Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket," in Annual Network &Distributed System Security Symposium (NDSS), 2014
-
(2014)
Annual Network &Distributed System Security Symposium (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hübner, M.3
Gascon, H.4
Rieck, K.5
-
36
-
-
84928156461
-
StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications
-
Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo, and F. Massacci, "StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications," in ACM Conference on Data and Application Security and Privacy (CODASPY), 2015
-
(2015)
ACM Conference on Data and Application Security and Privacy (CODASPY)
-
-
Zhauniarovich, Y.1
Ahmad, M.2
Gadyatskaya, O.3
Crispo, B.4
Massacci, F.5
-
37
-
-
84868259476
-
DroidMat: Android malware detection through manifest and API calls tracing
-
D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, "DroidMat: Android Malware Detection Through Manifest and API Calls Tracing," in Asia Joint Conference on Information Security, 2012
-
(2012)
Asia Joint Conference on Information Security
-
-
Wu, D.-J.1
Mao, C.-H.2
Wei, T.-E.3
Lee, H.-M.4
Wu, K.-P.5
-
38
-
-
84962136503
-
PUMA: Permission usage to detect malware in android
-
B. Sanz, I. Santos, C. Laorden, X. U.-P. P. Bringas, and G. Alvarez, "PUMA: Permission Usage to detect Malware in Android," in Advances in Intelligent Systems and Computing (AISC), 2012
-
(2012)
Advances in Intelligent Systems and Computing (AISC)
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Bringas, X.U.-P.P.4
Alvarez, G.5
-
40
-
-
84856225193
-
Andromaly a behavioral malware detection framework for android devices
-
A. Shabtai, U. Kananov, Y. Elovici, C. Glezer, and Y. Weiss, ""Andromaly": a behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, vol. 38, pp. 161-190, 1 2012
-
(2012)
Journal of Intelligent Information Systems
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kananov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
43
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets," in Annual Network &Distributed System Security Symposium (NDSS), 2012
-
(2012)
Annual Network &Distributed System Security Symposium (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
44
-
-
84962167480
-
Identifying Android malware using dynamically obtained features
-
V. M. Afonso, M. F. de Amorim, A. R. A. Gŕegio, G. B. Junquera, and P. L. de Geus, "Identifying Android malware using dynamically obtained features," Journal of Computer Virology and Hacking Techniques, 2014
-
(2014)
Journal of Computer Virology and Hacking Techniques
-
-
Afonso, V.M.1
De Amorim, M.F.2
Gŕegio, A.R.A.3
Junquera, G.B.4
De Geus, P.L.5
-
48
-
-
84900413299
-
Rage against the virtual machine: Hindering dynamic analysis of android malware
-
T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis, "Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware," in European Workshop on System Security (EuroSec), 2014
-
(2014)
European Workshop on System Security (EuroSec)
-
-
Petsas, T.1
Voyatzis, G.2
Athanasopoulos, E.3
Polychronakis, M.4
Ioannidis, S.5
-
52
-
-
85068676628
-
From throw-away traffic to bots: Detecting the rise of DGA-based malware
-
M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon, "From Throw-away Traffic to Bots: Detecting the Rise of DGA-based Malware," in USENIX Security Symposium, 2012
-
(2012)
USENIX Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
55
-
-
84962192323
-
-
"VirusTotal," http://www.virustotal.com
-
-
-
-
56
-
-
84904106043
-
-
F-Secure, "Mobile Threat Report Q2 2012," http://www.f-secure.com/ weblog/archives/MobileThreatReport Q2 2012.pdf, 2012
-
(2012)
Mobile Threat Report Q2 2012
-
-
-
58
-
-
84962168505
-
-
"Contagio," http://contagiominidump.blogspot.com
-
-
-
-
59
-
-
84907413882
-
The company you keep: Mobile malware infection rates and inexpensive risk indicators
-
H. T. T. Truong, E. Lagerspetz, P. Nurmi, A. J. Oliner, S. Tarkoma, N. Asokan, and S. Bhattacharya, "The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators," in International Conference on World Wide Web (WWW), 2014
-
(2014)
International Conference on World Wide Web (WWW)
-
-
Truong, H.T.T.1
Lagerspetz, E.2
Nurmi, P.3
Oliner, A.J.4
Tarkoma, S.5
Asokan, N.6
Bhattacharya, S.7
-
60
-
-
84962168513
-
-
(Retrieved: April 27,)
-
"AppBrain Stats," http://www.appbrain.com/stats/number-of-androidapps, (Retrieved: April 27, 2015)
-
(2015)
-
-
-
63
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario, "Towards an Understanding of Anti-Virtualization and Anti-Debugging Behavior in Modern Malware," in IEEE International Conference on Dependable Systems and Networks (DSN), 2008
-
(2008)
IEEE International Conference on Dependable Systems and Networks (DSN)
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
|