-
2
-
-
84984888152
-
-
Andrubis. http://anubis.iseclab.org/.
-
-
-
Andrubis1
-
3
-
-
84984926024
-
-
CopperDroid. http://copperdroid.isg.rhul.ac. uk/copperdroid/.
-
-
-
CopperDroid1
-
4
-
-
84984908977
-
-
DroidBox. https://code.google.com/p/droidbox/.
-
-
-
DroidBox1
-
5
-
-
84984926026
-
-
Droidbox device identifier patch. https://code.google.com/p/droidbox/ source/browse/trunk/droidbox23/ framework-base.patch?r=82.
-
Droidbox Device Identifier Patch
-
-
-
6
-
-
84984926016
-
-
Foresafe. http://www.foresafe.com/scan.
-
-
-
Foresafe1
-
10
-
-
84984866650
-
-
SandDroid. http://sanddroid.xjtu.edu.cn/.
-
-
-
SandDroid1
-
12
-
-
79958749593
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In NDSS, 2009.
-
(2009)
NDSS
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
13
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
T. Blasing, L. Batyuk, A. Schmidt, S. Camtepe, and S. Albayrak. An android application sandbox system for suspicious software detection. In MALWARE'10, 2010.
-
(2010)
MALWARE'10
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.3
Camtepe, S.4
Albayrak, S.5
-
14
-
-
33845524232
-
Network intrusion detection: Automated and manual methods prone to attack and evasion
-
D. J. Chaboya, R. A. Raines, R. O. Baldwin, and B. E. Mullins. Network intrusion detection: automated and manual methods prone to attack and evasion. Security & Privacy, IEEE, 4(6):36-43, 2006.
-
(2006)
Security & Privacy, IEEE
, vol.4
, Issue.6
, pp. 36-43
-
-
Chaboya, D.J.1
Raines, R.A.2
Baldwin, R.O.3
Mullins, B.E.4
-
15
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In Dependable Systems and Networks With FTCS and DCC, 2008. IEEE International Conference on, pages 177-186, 2008.
-
(2008)
Dependable Systems and Networks with FTCS and DCC, 2008 IEEE International Conference on
, pp. 177-186
-
-
Chen, X.1
Andersen, J.2
Mao, Z.M.3
Bailey, M.4
Nazario, J.5
-
16
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
ACM
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational experiences with high-volume network intrusion detection. In Proc. CCS, pages 2-11. ACM, 2004.
-
(2004)
Proc. CCS
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
18
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM
-
A. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proc. SPSM, pages 3-14. ACM, 2011.
-
(2011)
Proc. SPSM
, pp. 3-14
-
-
Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
20
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
ACM
-
P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In Proc. CCS, pages 59-68. ACM, 2006.
-
(2006)
Proc. CCS
, pp. 59-68
-
-
Fogla, P.1
Lee, W.2
-
21
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security, 2001.
-
(2001)
Proc. USENIX Security
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
23
-
-
84868375110
-
A conundrum of permissions: Installing applications on an android smartphone
-
Springer
-
P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A conundrum of permissions: Installing applications on an android smartphone. In USEC'12, pages 68-79. Springer, 2012.
-
(2012)
USEC'12
, pp. 68-79
-
-
Kelley, P.G.1
Consolvo, S.2
Cranor, L.F.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
24
-
-
77955172332
-
Measuring virtual machine detection in malware using dsd tracer
-
B. Lau and V. Svajcer. Measuring virtual machine detection in malware using dsd tracer. Journal in Computer Virology, 6(3):181-195, 2010.
-
(2010)
Journal in Computer Virology
, vol.6
, Issue.3
, pp. 181-195
-
-
Lau, B.1
Svajcer, V.2
-
25
-
-
84865574920
-
-
Feb
-
H. Lockheimer. Android and Security, Feb 2012. http://googlemobile.blogspot.com/2012/ 02/android-and-security.html.
-
(2012)
Android and Security
-
-
Lockheimer, H.1
-
27
-
-
84903593793
-
An experience developing an ids stimulator for the black-box testing of network intrusion detection systems
-
IEEE
-
D. Mutz, G. Vigna, and R. Kemmerer. An experience developing an ids stimulator for the black-box testing of network intrusion detection systems. In Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pages 374-383. IEEE, 2003.
-
(2003)
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
, pp. 374-383
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.3
-
29
-
-
84984886495
-
Improvement of the pi calculation algorithm and implementation of fast multiple precision computation
-
T. Ooura. Improvement of the pi calculation algorithm and implementation of fast multiple precision computation. Transactions-Japan Society for Industrial and Applied Mathematics, 9(4):165-172, 1999.
-
(1999)
Transactions-Japan Society for Industrial and Applied Mathematics
, vol.9
, Issue.4
, pp. 165-172
-
-
Ooura, T.1
-
30
-
-
85084163236
-
A fistful of red-pills: How to automatically generate procedures to detect cpu emulators
-
USENIX
-
R. Paleari, L. Martignoni, G. F. Roglia, and D. Bruschi. A fistful of red-pills: How to automatically generate procedures to detect cpu emulators. In Proc. WOOT, volume 41, page 86. USENIX, 2009.
-
(2009)
Proc. WOOT
, vol.41
, pp. 86
-
-
Paleari, R.1
Martignoni, L.2
Roglia, G.F.3
Bruschi, D.4
-
32
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, DTIC Document, 1998.
-
(1998)
Technical Report, DTIC Document
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
34
-
-
38149137346
-
Red pill... or how to detect vmm using (almost) one cpu instruction
-
J. Rutkowska. Red pill... or how to detect vmm using (almost) one cpu instruction. Invisible Things, 2004.
-
(2004)
Invisible Things
-
-
Rutkowska, J.1
-
36
-
-
84874823267
-
Sweetening android lemon markets: Measuring and combating malware in application marketplaces
-
ACM
-
T. Vidas and N. Christin. Sweetening android lemon markets: measuring and combating malware in application marketplaces. In Proc. 3rd CODASPY, pages 197-208. ACM, 2013.
-
(2013)
Proc. 3rd CODASPY
, pp. 197-208
-
-
Vidas, T.1
Christin, N.2
-
37
-
-
85084161115
-
All your droid are belong to us: A survey of current android attacks
-
T. Vidas, D. Votipka, and N. Christin. All your droid are belong to us: A survey of current android attacks. In Proc. WOOT. USENIX, 2011.
-
(2011)
Proc. WOOT. USENIX
-
-
Vidas, T.1
Votipka, D.2
Christin, N.3
-
38
-
-
84864618030
-
Toward a general collection methodology for android devices
-
T. Vidas, C. Zhang, and N. Christin. Toward a general collection methodology for android devices. DFRWS'11, 2011.
-
(2011)
DFRWS'11
-
-
Vidas, T.1
Zhang, C.2
Christin, N.3
-
39
-
-
34047110218
-
Toward automated dynamic malware analysis using cwsandbox
-
C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. Security & Privacy, IEEE, 5(2):32-39, 2007.
-
(2007)
Security & Privacy, IEEE
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
41
-
-
84869431150
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proc. NDSS, 2012.
-
(2012)
Proc. NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|