메뉴 건너뛰기




Volumn , Issue , 2016, Pages

Behavioral malware detection approaches for Android

Author keywords

ADB; Android; Busybox; malware detection; netstat; pcap

Indexed keywords

ANDROID (OPERATING SYSTEM); COMPUTER CRIME; MALWARE;

EID: 84981313545     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2016.7511573     Document Type: Conference Paper
Times cited : (19)

References (11)
  • 1
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting android malware: Characterization and evolution
    • San Francisco, CA, May 20-23
    • Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution, " in IEEE Symposium on Security and Privacy, San Francisco, CA, May 20-23, 2012, pp. 95-109.
    • (2012) IEEE Symposium on Security and Privacy , pp. 95-109
    • Zhou, Y.1    Jiang, X.2
  • 2
    • 84981300907 scopus 로고    scopus 로고
    • Mobile cyber threats.
    • Kaspersky Lab and INTERPOL Survey Reports, http://media. kaspersky. com/pdf/Kaspersky-Lab-KSN-Report-mobilecyberthreats-web. pdf, "Mobile cyber threats. "
    • Kaspersky Lab and INTERPOL Survey Reports
  • 5
    • 84866674166 scopus 로고    scopus 로고
    • Detection of mobile malware in the wild
    • Sep
    • M. Chandramohan and H. B. K. Tan, "Detection of mobile malware in the wild, " IEEE Computer, vol. 45, no. 9, pp. 65-71, Sep 2012.
    • (2012) IEEE Computer , vol.45 , Issue.9 , pp. 65-71
    • Chandramohan, M.1    Tan, H.B.K.2
  • 7
    • 84923848610 scopus 로고    scopus 로고
    • Detection of malicious android mobile applications based on aggregated system call events
    • March
    • Y. J. Ham and H. Lee, "Detection of malicious android mobile applications based on aggregated system call events, " International Journal of Computer and Communication Engineering, vol. 3, no. 2, pp. 340-350, March, 2014.
    • (2014) International Journal of Computer and Communication Engineering , vol.3 , Issue.2 , pp. 340-350
    • Ham, Y.J.1    Lee, H.2
  • 8
    • 84888862842 scopus 로고    scopus 로고
    • Identifying android malicious repackaged applications by thread-grained system call sequences
    • C. C. H. T. Y. Lin, Y. Lai, "Identifying android malicious repackaged applications by thread-grained system call sequences, " Computers and Security, vol. 39, pp. 340-350.
    • Computers and Security , vol.39 , pp. 340-350
    • Lin, C.C.H.T.Y.1    Lai, Y.2
  • 11
    • 84981317449 scopus 로고    scopus 로고
    • Netstat command, http://en. wikipedia. org/wiki/Netstat.
    • Netstat Command


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.