-
4
-
-
84872224783
-
MADAM: A multi-level anomaly detector for android malware
-
7531. St. Petersburg, Russia: Springer October
-
G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, "MADAM: A Multi-level Anomaly Detector for Android Malware," in Computer Network Security-6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS, ser. Lecture Notes in Computer Science, vol. 7531. St. Petersburg, Russia: Springer, "October" 2012, pp. 240-253.
-
(2012)
Computer Network Security-6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS, Ser. Lecture Notes in Computer Science
, pp. 240-253
-
-
Dini, G.1
Martinelli, F.2
Saracino, A.3
Sgandurra, D.4
-
5
-
-
77952331717
-
PBMDS: A behaviorbased malware detection system for cellphone devices
-
New York, NY, USA: ACM
-
L. Xie, X. Zhang, J.-P. Seifert, and S. Zhu, "pBMDS: a behaviorbased malware detection system for cellphone devices," in Proceedings of the third ACM conference on Wireless network security, ser. WiSec '10. New York, NY, USA: ACM, 2010, pp. 37-48.
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security, Ser. WiSec '10
, pp. 37-48
-
-
Xie, L.1
Zhang, X.2
Seifert, J.-P.3
Zhu, S.4
-
6
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
New York, NY, USA: ACM
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: Behavior-based Malware Detection System for Android," in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 15-26.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Ser. SPSM '11
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
9
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA: USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-6. [Online]. Available: http://dl.acm.org/citation.cfm?id=1924943.1924971
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, Ser. OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
10
-
-
84904350319
-
A measurement study of google play
-
New York, NY, USA: ACM
-
N. Viennot, E. Garcia, and J. Nieh, "A measurement study of google play," in The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, ser. SIGMETRICS '14. New York, NY, USA: ACM, 2014, pp. 221-233.
-
(2014)
The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, Ser. SIGMETRICS '14
, pp. 221-233
-
-
Viennot, N.1
Garcia, E.2
Nieh, J.3
-
11
-
-
84908068169
-
Permission use analysis for vetting undesirable behaviors in android apps
-
Nov
-
Y. Zhang, M. Yang, Z. Yang, G. Gu, P. Ning, and B. Zang, "Permission use analysis for vetting undesirable behaviors in android apps," Information Forensics and Security, IEEE Transactions on, vol. 9, no. 11, pp. 1828-1842, Nov 2014.
-
(2014)
Information Forensics and Security, IEEE Transactions on
, vol.9
, Issue.11
, pp. 1828-1842
-
-
Zhang, Y.1
Yang, M.2
Yang, Z.3
Gu, G.4
Ning, P.5
Zang, B.6
-
12
-
-
84923050844
-
Detect android malware variants using component based topology graph
-
Sept
-
T. Shen, Y. Zhongyang, Z. Xin, B. Mao, and H. Huang, "Detect android malware variants using component based topology graph," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on, Sept 2014, pp. 406-413.
-
(2014)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
, pp. 406-413
-
-
Shen, T.1
Zhongyang, Y.2
Xin, Z.3
Mao, B.4
Huang, H.5
-
13
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
L.-K. Yan and H. Yin, "Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis," in USENIX Security Symposium, 2012, pp. 569-584.
-
(2012)
USENIX Security Symposium
, pp. 569-584
-
-
Yan, L.-K.1
Yin, H.2
-
15
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
Nancy, France
-
T. Blasing, A.-D. Schmidt, L. Batyuk, S. A. Camtepe, and S. Albayrak, "An Android Application Sandbox System for Suspicious Software Detection," in 5th International Conference on Malicious and Unwanted Software (MALWARE'2010), Nancy, France,, 2010.
-
(2010)
5th International Conference on Malicious and Unwanted Software (MALWARE'2010)
-
-
Blasing, T.1
Schmidt, A.-D.2
Batyuk, L.3
Camtepe, S.A.4
Albayrak, S.5
-
16
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
Feb
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, "Andromaly: a behavioral malware detection framework for android devices," J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161-190, Feb. 2012.
-
(2012)
J. Intell. Inf. Syst
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
17
-
-
85178287263
-
Drebin: Efficient and explainable detection of android malware in your pocket
-
February
-
Arp, Daniel and Spreitzenbarth, Michael and Habner, Malte and Gascon, Hugo and Rieck, Konrad, "Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket," in Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), February 2014.
-
(2014)
Proceedings of the 17th Network and Distributed System Security Symposium (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Habner, M.3
Gascon, H.4
Rieck, K.5
-
18
-
-
84874865861
-
Appsplayground: Automatic security analysis of smartphone applications
-
New York, NY, USA: ACM
-
V. Rastogi, Y. Chen, and W. Enck, "Appsplayground: Automatic security analysis of smartphone applications," in Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY '13. New York, NY, USA: ACM, 2013, pp. 209-220.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, Ser. CODASPY '13
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
19
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
San Diego, CA, USA, Feb
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets," in Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012), San Diego, CA, USA, Feb 2012.
-
(2012)
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
20
-
-
84898954424
-
MAST: Triage for market-scale mobile malware analysis
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck, "MAST: Triage for Market-scale Mobile Malware Analysis," in Proc. 6th WiSec, 2013.
-
(2013)
Proc. 6th WiSec
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
21
-
-
84922973453
-
Attack tree based android malware detection with hybrid analysis
-
Sept
-
S. Zhao, X. Li, G. Xu, L. Zhang, and Z. Feng, "Attack tree based android malware detection with hybrid analysis," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on, Sept 2014, pp. 380-387.
-
(2014)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
, pp. 380-387
-
-
Zhao, S.1
Li, X.2
Xu, G.3
Zhang, L.4
Feng, Z.5
-
23
-
-
84904490791
-
Analysis of features selection and machine learning classifier in android malware detection
-
May
-
M. Mas'ud, S. Sahib, M. Abdollah, S. Selamat, and R. Yusof, "Analysis of features selection and machine learning classifier in android malware detection," in Information Science and Applications (ICISA), 2014 Int. Conf. on, May 2014, pp. 1-5.
-
(2014)
Information Science and Applications (ICISA), 2014 Int. Conf. on
, pp. 1-5
-
-
Mas'Ud, M.1
Sahib, S.2
Abdollah, M.3
Selamat, S.4
Yusof, R.5
-
24
-
-
84868087373
-
Puma: Permission usage to detect malware in android
-
Springer
-
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, P. G. Bringas, and G. A. Maranon, "Puma: Permission usage to detect malware in android." ser. Advances in Intelligent Systems and Computing, A. e. a. Herrero, Ed., vol. 189. Springer, 2012, pp. 289-298.
-
(2012)
Ser. Advances in Intelligent Systems and Computing, A. E. A. Herrero, Ed
, vol.189
, pp. 289-298
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Bringas, P.G.5
Maranon, G.A.6
-
25
-
-
84860281488
-
Robotdroid: A lightweight malware detection framework on smartphones
-
M. Zhao, T. Zhang, F. Ge, and Z. Yuan, "Robotdroid: A lightweight malware detection framework on smartphones," Journal of Networks, vol. 7, no. 4, 2012. [Online]. Available: http://ojs. academypublisher.com/index.php/jnw/article/view/jnw0704715722
-
(2012)
Journal of Networks
, vol.7
, Issue.4
-
-
Zhao, M.1
Zhang, T.2
Ge, F.3
Yuan, Z.4
-
26
-
-
84966899862
-
-
in Hack.lu, Luxembourg, Oct
-
A. Apvrille and L. Apvrille, "Sherlockdroid, an inspector for android marketplaces," in Hack.lu, Luxembourg, Oct. 2014.
-
(2014)
Sherlockdroid, An Inspector for Android Marketplaces
-
-
Apvrille, A.1
Apvrille, L.2
-
28
-
-
84966846837
-
-
Fortiguard Center fortiguard Encyclopedia
-
Fortiguard Center, "Android/RuSMS.AO," 2013, fortiguard Encyclopedia, http://www.fortiguard.com/encyclopedia/virus/#id= 5897642.
-
(2013)
Android/RuSMS.AO
-
-
-
30
-
-
84930529379
-
-
in GreHack, November grenoble, France
-
L. Apvrille and A. Apvrille, "Pre-filtering Mobile Malware with Heuristic Techniques," in GreHack, November 2013, pp. 43-59, grenoble, France.
-
(2013)
Pre-filtering Mobile Malware with Heuristic Techniques
, pp. 43-59
-
-
Apvrille, L.1
Apvrille, A.2
-
31
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
software available at
-
C.-C. Chang and C.-J. Lin, "LIBSVM: A library for support vector machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, pp. 27:1-27:27, 2011, software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2
, pp. 271-2727
-
-
Chang, C.-C.1
Lin, C.-J.2
-
32
-
-
0033281701
-
Improved boosting algorithms using confidence-rated predictions
-
R. E. Schapire and Y. Singer, "Improved boosting algorithms using confidence-rated predictions," in Machine Learning, 1999, pp. 80-91.
-
(1999)
Machine Learning
, pp. 80-91
-
-
Schapire, R.E.1
Singer, Y.2
-
33
-
-
84944930957
-
Facial makeup detection technique based on texture and shape analysis
-
May, ljubljana, Slovenia
-
N. Kose, L. Apvrille, and J.-L. Dugelay, "Facial Makeup Detection Technique Based on Texture and Shape Analysis ," in 11th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2015), May 2015, ljubljana, Slovenia.
-
(2015)
11th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2015)
-
-
Kose, N.1
Apvrille, L.2
Dugelay, J.-L.3
|