-
2
-
-
84904098536
-
-
F-Secure March
-
F-Secure, "Threat Report H2 2013, " http://www. f-secure. com/static/doc/ labs global/Research/Threat Report H2 2013. pdf, March 2014.
-
(2014)
Threat Report H2 2013
-
-
-
3
-
-
84855746345
-
-
August, McAfee Labs
-
McAfee Labs, "McAfee Threats Report: Second Quarter 2013, " http://www. mcafee. com/us/resources/reports/rp-quarterly-threat-q2-2013. pdf, August 2013.
-
(2013)
McAfee Threats Report: Second Quarter 2013
-
-
-
5
-
-
84865574920
-
-
February
-
H. Lockheimer, "Android and Security, " http://googlemobile. blogspot. com/2012/02/android-and-security. html, February 2012.
-
(2012)
Android and Security
-
-
Lockheimer, H.1
-
6
-
-
84904132408
-
AndRadar: Fast discovery of android applications in alternative markets
-
M. Lindorfer, S. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, C. Platzer, S. Zanero, and S. Ioannidis, "AndRadar: fast discovery of android applications in alternative markets, " in Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2014.
-
(2014)
Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
-
-
Lindorfer, M.1
Volanis, S.2
Sisto, A.3
Neugschwandtner, M.4
Athanasopoulos, E.5
Maggi, F.6
Platzer, C.7
Zanero, S.8
Ioannidis, S.9
-
7
-
-
84878001173
-
Mobile-sandbox: Having a deeper look into android applications
-
M. Spreitzenbarth, F. Freiling, F. Echtler, T. Schreck, and J. Hoffmann, "Mobile-sandbox: Having a Deeper Look into Android Applications, " in Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC), 2013.
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC)
-
-
Spreitzenbarth, M.1
Freiling, F.2
Echtler, F.3
Schreck, T.4
Hoffmann, J.5
-
8
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
T. Bläsing, L. Batyuk, A.-D. Schmidt, S. Camtepe, and S. Albayrak, "An Android Application Sandbox System for Suspicious Software Detection, " in Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE), 2010.
-
(2010)
Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE)
-
-
Bläsing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.4
Albayrak, S.5
-
9
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
L. K. Yan and H. Yin, "Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis, " in Proceedings of the 21st USENIX Security Symposium, 2012.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
-
-
Yan, L.K.1
Yin, H.2
-
11
-
-
84892396007
-
ANANAS-A framework for analyzing android applications
-
T. Eder, M. Rodler, D. Vymazal, and M. Zeilinger, "ANANAS-A Framework For Analyzing Android Applications, " in Proceedings on the 1st International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM), 2013.
-
(2013)
Proceedings on the 1st International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM)
-
-
Eder, T.1
Rodler, M.2
Vymazal, D.3
Zeilinger, M.4
-
13
-
-
84968922045
-
-
"VisualThreat, " http://www. visualthreat. com.
-
-
-
-
14
-
-
84977846928
-
-
"Joe Sandbox Mobile, " http://www. joesecurity. org/joe-sandbox-mobile.
-
Joe Sandbox Mobile
-
-
-
15
-
-
84961593974
-
Enter sandbox: Android sandbox comparison
-
S. Neuner, V. van der Veen, M. Lindorfer, M. Huber, G. Merzdovnik, M. Mulazzani, and E. Weippl, "Enter Sandbox: Android Sandbox Comparison, " in Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST), 2014.
-
(2014)
Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST)
-
-
Neuner, S.1
Vanderveen, V.2
Lindorfer, M.3
Huber, M.4
Merzdovnik, G.5
Mulazzani, M.6
Weippl, E.7
-
17
-
-
84889030716
-
AndroTotal: A flexible, scalable toolbox and service for testing mobile malware detectors
-
F. Maggi, A. Valdi, and S. Zanero, "AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors, " in Proceedings of the 3rd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2013.
-
(2013)
Proceedings of the 3rd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Maggi, F.1
Valdi, A.2
Zanero, S.3
-
18
-
-
84968730996
-
-
"Anubis, " http://anubis. iseclab. org.
-
-
-
-
20
-
-
85084096603
-
A view on current malware behaviors
-
U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel, "A View on Current Malware Behaviors, " in Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats (LEET), 2009.
-
(2009)
Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats (LEET)
-
-
Bayer, U.1
Habibi, I.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
21
-
-
84968775542
-
-
"VirusTotal, " http://www. virustotal. com.
-
-
-
-
22
-
-
77955038057
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Milani Comparetti, C. Hlauscheck, C. Kruegel, and E. Kirda, "Scalable, Behavior-Based Malware Clustering, " in Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS), 2009.
-
(2009)
Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Milanicomparetti, P.2
Hlauscheck, C.3
Kruegel, C.4
Kirda, E.5
-
23
-
-
84904090498
-
-
Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001
-
L. Weichselbaum, M. Neugschwandtner, M. Lindorfer, Y. Fratantonio, V. van der Veen, and C. Platzer, "Andrubis: Android Malware Under The Magnifying Glass, " Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414-001, 2014.
-
(2014)
Andrubis: Android Malware under the Magnifying Glass
-
-
Weichselbaum, L.1
Neugschwandtner, M.2
Lindorfer, M.3
Fratantonio, Y.4
Vanderveen, V.5
Platzer, C.6
-
24
-
-
84907414245
-
The core of the matter: Analyzing malicious traffic in cellular carriers
-
C. Lever, M. Antonakakis, B. Reaves, P. Traynor, and W. Lee, "The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers, " in Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS), 2013.
-
(2013)
Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Lever, C.1
Antonakakis, M.2
Reaves, B.3
Traynor, P.4
Lee, W.5
-
26
-
-
84907413882
-
The company you keep: Mobile malware infection rates and inexpensive risk indicators
-
H. T. T. Truong, E. Lagerspetz, P. Nurmi, A. J. Oliner, S. Tarkoma, N. Asokan, and S. Bhattacharya, "The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators, " in Proceedings of the 23rd International Conference on World Wide Web (WWW), 2014.
-
(2014)
Proceedings of the 23rd International Conference on World Wide Web (WWW)
-
-
Truong, H.T.T.1
Lagerspetz, E.2
Nurmi, P.3
Oliner, A.J.4
Tarkoma, S.5
Asokan, N.6
Bhattacharya, S.7
-
27
-
-
84968873738
-
-
"Andrubis Submission App, " https://play. google. com/store/apps/details? id=org. iseclab. Andrubis.
-
Andrubis Submission App
-
-
-
28
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, " in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI), 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
29
-
-
84887656322
-
-
Secure Systems Lab at Stony Brook University, Tech. Rep.
-
L. Cavallaro, P. Saxena, and R. Sekar, "Anti-Taint-Analysis: Practical Evasion Techniques Against Information Flow Based Malware Defense, " Secure Systems Lab at Stony Brook University, Tech. Rep. , 2007.
-
(2007)
Anti-Taint-Analysis: Practical Evasion Techniques Against Information Flow Based Malware Defense
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
30
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, "PScout: Analyzing the Android Permission Specification, " in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), 2012.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS)
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
31
-
-
80755187788
-
Android permissions demystified
-
A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android Permissions Demystified, " in Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
32
-
-
84968933973
-
-
Google
-
Google, "Introducing ART, " https://source. Android. com/devices/tech/ dalvik/art. html, 2014.
-
(2014)
Introducing ART
-
-
-
34
-
-
37849044998
-
Measurement and analysis of autonomous spreading malware in a university environment
-
J. Goebel, T. Holz, and C. Willems, "Measurement and Analysis of Autonomous Spreading Malware in a University Environment, " in Proceedings of the 4th International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), 2007.
-
(2007)
Proceedings of the 4th International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA)
-
-
Goebel, J.1
Holz, T.2
Willems, C.3
-
35
-
-
84968750059
-
-
"Contagio, " http://contagiominidump. blogspot. com.
-
Contagio
-
-
-
37
-
-
84920179504
-
Andlantis: Large-scale android dynamic analysis
-
M. Bierma, E. Gustafson, J. Erickson, D. Fritz, and Y. R. Choe, "Andlantis: Large-scale Android Dynamic Analysis, " in Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST), 2014.
-
(2014)
Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST)
-
-
Bierma, M.1
Gustafson, E.2
Erickson, J.3
Fritz, D.4
Choe, Y.R.5
-
39
-
-
84910658019
-
Drebin: Efficient and explainable detection of android malware in your pocket
-
D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, and K. Rieck, "Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket, " in Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS), 2014.
-
(2014)
Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hübner, M.3
Gascon, H.4
Rieck, K.5
-
41
-
-
84968860149
-
-
August
-
B. Irinco, "First Android Trojan in the Wild, " http://blog. Trendmicro. com/ trendlabs-security-intelligence/first-android-trojan-in-the-wild, August 2010.
-
(2010)
First Android Trojan in the Wild
-
-
Irinco, B.1
-
44
-
-
84869797921
-
Understanding and improving app installation security mechanisms through empirical analysis of android
-
D. Barrera, J. Clark, D. McCarney, and P. C. van Oorschot, "Understanding and Improving App Installation Security Mechanisms Through Empirical Analysis of Android, " in Proceedings of the 2nd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2012.
-
(2012)
Proceedings of the 2nd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Barrera, D.1
Clark, J.2
McCarney, D.3
Vanoorschot, P.C.4
-
45
-
-
84872117493
-
Analysis of the communication between colluding applications on modern smartphones
-
C. Marforio, H. Ritzdorf, A. Francillon, and S. Capkun, "Analysis of the Communication Between Colluding Applications on Modern Smartphones, " in Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), 2012.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC)
-
-
Marforio, C.1
Ritzdorf, H.2
Francillon, A.3
Capkun, S.4
-
46
-
-
84984924868
-
Droidray: A security evaluation system for customized android firmwares
-
M. Zheng, M. Sun, and J. C. Lui, "DroidRay: A Security Evaluation System for Customized Android Firmwares, " in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014.
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Zheng, M.1
Sun, M.2
Lui, J.C.3
-
48
-
-
84968787402
-
State of mobile security 2012
-
Lookout Mobile Security, "State of Mobile Security 2012, " https://www. lookout. com/ downloads/lookout-state-of-mobilesecurity-2012. pdf, 2012.
-
(2012)
Lookout Mobile Security
-
-
-
57
-
-
84910658142
-
Execute this! analyzing unsafe and malicious dynamic code loading in android applications
-
S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, and G. Vigna, "Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications, " in Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS), 2014.
-
(2014)
Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Poeplau, S.1
Fratantonio, Y.2
Bianchi, A.3
Kruegel, C.4
Vigna, G.5
-
58
-
-
84888984394
-
-
February
-
V. Chebyshev, "Mobile attacks!" http://www. securelist. com/en/blog/805/ Mobile attacks, February 2013.
-
(2013)
Mobile Attacks!
-
-
Chebyshev, V.1
-
59
-
-
84968701193
-
-
F-Secure July
-
F-Secure, "Android Hack-Tool Steals PC Info, " http://www. fsecure. com/weblog/archives/00002573. html, July 2013.
-
(2013)
Android Hack-Tool Steals PC Info
-
-
-
61
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A Survey of Mobile Malware in the Wild, " in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
62
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning, "Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces, " in Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), 2012.
-
(2012)
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY)
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
63
-
-
84874828789
-
Fast, scalable detection of piggybacked mobile applications
-
W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou, "Fast, Scalable Detection of "Piggybacked" Mobile Applications, " in Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY), 2013.
-
(2013)
Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY)
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
64
-
-
84869757378
-
SmartDroid: An automatic system for revealing ui-based trigger conditions in android applications
-
C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, and W. Zou, "SmartDroid: An Automatic System for Revealing UI-based Trigger Conditions in Android Applications, " in Proceedings of the 2nd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2012.
-
(2012)
Proceedings of the 2nd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
-
Zheng, C.1
Zhu, S.2
Dai, S.3
Gu, G.4
Gong, X.5
Zou, W.6
-
66
-
-
84864991061
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets, " in Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), 2012.
-
(2012)
Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
67
-
-
84968841669
-
-
"CopperDroid, " http://copperdroid. isg. rhul. Ac. uk.
-
-
-
-
68
-
-
84968825921
-
-
"Tracedroid, " http://tracedroid. few. vu. nl.
-
-
-
-
69
-
-
84968803845
-
-
Internet & Web Technology Master thesis, VU University Amsterdam
-
V. van der Veen, "Dynamic Analysis of Android Malware, " Internet & Web Technology Master thesis, VU University Amsterdam, 2013.
-
(2013)
Dynamic Analysis of Android Malware
-
-
Vanderveen, V.1
-
70
-
-
84968803848
-
-
"SandDroid, " http://sanddroid. xjtu. edu. cn.
-
-
-
-
71
-
-
84968701250
-
-
"Mobile Sandbox, " http://mobilesandbox. org.
-
-
-
-
72
-
-
84900413299
-
Rage against the virtual machine: Hindering dynamic analysis of android malware
-
T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis, "Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware, " in Proceedings of the Seventh European Workshop on System Security (EuroSec), 2014.
-
(2014)
Proceedings of the Seventh European Workshop on System Security (EuroSec)
-
-
Petsas, T.1
Voyatzis, G.2
Athanasopoulos, E.3
Polychronakis, M.4
Ioannidis, S.5
|