-
1
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certification," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 235-245.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
2
-
-
84864033989
-
Android permissions: A perspective combining risks and benefits
-
B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Android permissions: A perspective combining risks and benefits," in Proc. 17th ACM Symp. Access Control Models Technol., 2012, pp. 13-22.
-
(2012)
Proc. 17th ACM Symp. Access Control Models Technol.
, pp. 13-22
-
-
Sarma, B.P.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
3
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Using probabilistic generative models for ranking risks of Android apps," in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 241-252.
-
(2012)
Proc. ACM Conf. Comput. Commun. Security
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
4
-
-
80755187788
-
Android permissions demystified
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 627-638.
-
(2011)
Proc. 18th ACM Conf. Comput. Commun. Security
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
5
-
-
34548105186
-
Large-scale Bayesian logistic regression for text categorization
-
A. Genkin, D. D. Lewis, and D. Madigan, "Large-scale Bayesian logistic regression for text categorization," Technometrics, vol. 49, no. 3, pp. 291-304, 2007.
-
(2007)
Technometrics
, vol.49
, Issue.3
, pp. 291-304
-
-
Genkin, A.1
Lewis, D.D.2
Madigan, D.3
-
6
-
-
84867883244
-
A discriminative data-dependent mixture-model approach for multiple instance learning in image classification
-
Q. Wang, L. Si, and D. Zhang, "A discriminative data-dependent mixture-model approach for multiple instance learning in image classification," in Proc. 12th Eur. Conf. Comput. Vis.-Vol. Part IV, 2012, pp. 660-673.
-
(2012)
Proc. 12th Eur. Conf. Comput. Vis.-Vol. Part IV
, pp. 660-673
-
-
Wang, Q.1
Si, L.2
Zhang, D.3
-
7
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, "Riskranker: scalable and accurate zero-day Android malware detection," in Proc. 10th Int. Conf. Mobile Syst., Appl., Services, 2012, pp. 281-294.
-
(2012)
Proc. 10th Int. Conf. Mobile Syst., Appl., Services
, pp. 281-294
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
8
-
-
77950125602
-
Detecting symbian OS malware through static function call analysis
-
A.-D. Schmidt, J. Clausen, A. Camtepe, and S. Albayrak, "Detecting symbian OS malware through static function call analysis," in Proc. 4th Int. Conf. Malicious Unwanted Softw., 2009, pp. 15-22.
-
(2009)
Proc. 4th Int. Conf. Malicious Unwanted Softw.
, pp. 15-22
-
-
Schmidt, A.-D.1
Clausen, J.2
Camtepe, A.3
Albayrak, S.4
-
9
-
-
68549133155
-
Learning from imbalanced data
-
Sep.
-
H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Trans. Knowl. Data Eng., vol. 21, no. 9, pp. 1263-1284, Sep. 2009.
-
(2009)
IEEE Trans. Knowl. Data Eng.
, vol.21
, Issue.9
, pp. 1263-1284
-
-
He, H.1
Garcia, E.A.2
-
10
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Dec.
-
J. Z. Kolter and M. A. Maloof, "Learning to detect and classify malicious executables in the wild," J. Mach. Learn. Res., vol. 7, pp. 2721-2744, Dec. 2006.
-
(2006)
J. Mach. Learn. Res.
, vol.7
, pp. 2721-2744
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
11
-
-
80755168347
-
Bitshred: Feature hashing malware for scalable triage and semantic analysis
-
J. Jang, D. Brumley, and S. Venkataraman, "Bitshred: Feature hashing malware for scalable triage and semantic analysis," in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 309-320.
-
(2011)
Proc. 18th ACM Conf. Comput. Commun. Security
, pp. 309-320
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
12
-
-
84857956709
-
Android: Static analysis using similarity distance
-
A. Desnos, "Android: Static analysis using similarity distance," in Proc. 45th Hawaii Int. Conf. Syst. Sci., 2012, pp. 5394-5403.
-
(2012)
Proc. 45th Hawaii Int. Conf. Syst. Sci.
, pp. 5394-5403
-
-
Desnos, A.1
-
13
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
A.-D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K. A. Yüksel, S. A. Camtepe, and S. Albayrak, "Static analysis of executables for collaborative malware detection on Android," in Proc. IEEE Int. Conf. Commun., 2009, pp. 1-5.
-
(2009)
Proc. IEEE Int. Conf. Commun.
, pp. 1-5
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.4
Kiraz, O.5
Yüksel, K.A.6
Camtepe, S.A.7
Albayrak, S.8
-
14
-
-
85025700509
-
A study of android application security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of Android application security," in Proc. 20th USENIX Conf. Secur., 2011, p. 21.
-
(2011)
Proc. 20th USENIX Conf. Secur.
, pp. 21
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
15
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Feb.
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets," in Proc. 19th Annu. Netw. Distrib. Syst. Security Symp., Feb. 2012.
-
(2012)
Proc. 19th Annu. Netw. Distrib. Syst. Security Symp.
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
16
-
-
85025148063
-
Droidapiminer: Mining apilevel features for robust malware detection in android
-
Y. Aafer, W. Du, and H. Yin, "Droidapiminer: Mining apilevel features for robust malware detection in android," in Proc. 9th Int. ICST Conf. Security Privacy Commun. Netw., 2013, pp. 86-103.
-
(2013)
Proc. 9th Int. ICST Conf. Security Privacy Commun. Netw.
, pp. 86-103
-
-
Aafer, Y.1
Du, W.2
Yin, H.3
-
17
-
-
37849017546
-
Mining specifications of malicious behavior
-
M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proc. 6th Joint Meeting Eur. Softw. Eng. Conf. ACM SIGSOFT Symp. Found. Softw. Eng., 2007, pp. 5-14.
-
(2007)
Proc. 6th Joint Meeting Eur. Softw. Eng. Conf. ACM SIGSOFT Symp. Found. Softw. Eng.
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
18
-
-
49949090311
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov, "Learning and classification of malware behavior," in Proc. 5th Int. Conf. Detection Intrusions Malware, Vulnerability Assessment, 2008, pp. 108-125.
-
(2008)
Proc. 5th Int. Conf. Detection Intrusions Malware, Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
19
-
-
38149089416
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," in Proc. 10th Int. Conf. Recent Adv. Intrusion Detection, 2007, pp. 178-197.
-
(2007)
Proc. 10th Int. Conf. Recent Adv. Intrusion Detection
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
20
-
-
84867714245
-
Applying behavioral detection on android-based devices
-
A. Shabtai and Y. Elovici, "Applying behavioral detection on Android-based devices," in Proc. 3rd Int. Conf. Mobile Wireless Middleware, Operating Syst., Appl., 2010, pp. 235-249.
-
(2010)
Proc. 3rd Int. Conf. Mobile Wireless Middleware, Operating Syst., Appl.
, pp. 235-249
-
-
Shabtai, A.1
Elovici, Y.2
-
21
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid Android: Versatile protection for smartphones," in Proc. 26th Annu. Comput. Security Appl. Conf., 2010, pp. 347-356.
-
(2010)
Proc. 26th Annu. Comput. Security Appl. Conf.
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
22
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: Behavior-based malware detection system for Android," in Proc. 1st ACM Workshop Security Privacy Smartphones Mobile Devices, 2011, pp. 15-26.
-
(2011)
Proc. 1st ACM Workshop Security Privacy Smartphones Mobile Devices
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
23
-
-
84869388345
-
Pscout: Analyzing the android permission specification
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, "Pscout: Analyzing the Android permission specification," in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 217-228.
-
(2012)
Proc. ACM Conf. Comput. Commun. Security
, pp. 217-228
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
24
-
-
84942541638
-
The effectiveness of application permissions
-
A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in Proc. 2nd USENIX Conf. Web Appl. Develop., 2011, p. 7.
-
(2011)
Proc. 2nd USENIX Conf. Web Appl. Develop
, pp. 7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
25
-
-
33749249600
-
The relationship between precision-recall and ROC curves
-
J. Davis and M. Goadrich, "The relationship between Precision-Recall and ROC curves," in Proc. 23rd Int. Conf. Mach. Learn., 2006, pp. 233-240.
-
(2006)
Proc. 23rd Int. Conf. Mach. Learn.
, pp. 233-240
-
-
Davis, J.1
Goadrich, M.2
-
26
-
-
0003141935
-
A comparative study on feature selection in text categorization
-
Y. Yang and J. O. Pedersen, "A comparative study on feature selection in text categorization," in Proc. 14th Int. Conf. Mach. Learn., 1997, pp. 412-420.
-
(1997)
Proc. 14th Int. Conf. Mach. Learn.
, pp. 412-420
-
-
Yang, Y.1
Pedersen, J.O.2
-
28
-
-
72849109117
-
Aligned graph classification with regularized logistic regression
-
B. Quanz and J. Huan, "Aligned graph classification with regularized logistic regression," in Proc. SIAM Int. Conf. Data Mining, 2009, pp. 353-364.
-
(2009)
Proc. SIAM Int. Conf. Data Mining
, pp. 353-364
-
-
Quanz, B.1
Huan, J.2
-
29
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Proc. IEEE Symp. Security Privacy, 2012, pp. 95-109.
-
(2012)
Proc. IEEE Symp. Security Privacy
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
30
-
-
33646023117
-
An introduction to ROC analysis
-
Jun.
-
T. Fawcett, "An introduction to ROC analysis," Pattern Recog. Lett., vol. 27, no. 8, pp. 861-874, Jun. 2006.
-
(2006)
Pattern Recog. Lett.
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
31
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," ACM Trans. Inf. Syst. Security, vol. 3, no. 3, pp. 186-205, 2000.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
32
-
-
84878002579
-
Droidchameleon: Evaluating android anti-malware against transformation attacks
-
V. Rastogi, Y. Chen, and X. Jiang, "Droidchameleon: Evaluating android anti-malware against transformation attacks," in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, 2013, pp. 329-334.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
|