-
2
-
-
84986903831
-
-
ProGuard. http://proguard.sourceforge.net/.
-
-
-
ProGuard1
-
3
-
-
84986885804
-
-
Q2 IT evolution threat report. http://www.securelist.com/en/analysis/204792299/IT-Threat-Evolution-Q2-2013.
-
-
-
Q2 IT evolution threat report1
-
5
-
-
84986903835
-
-
VirusTotal. https://www.virustotal.com/en/.
-
-
-
VirusTotal1
-
6
-
-
84894158139
-
DroidAPIMiner: Mining API-level features for robust malware detection in Android
-
Y. Aafer, W. Du, and H. Yin. DroidAPIMiner: Mining API-level features for robust malware detection in Android. In SecureComm, 2013.
-
(2013)
SecureComm
-
-
Aafer, Y.1
Du, W.2
Yin, H.3
-
8
-
-
85178287263
-
-
D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, K. Rieck, and C. Siemens. Drebin: Effective and explainable detection of android malware in your pocket. 2014.
-
(2014)
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
-
-
Arp, D.1
Spreitzenbarth, M.2
Hübner, M.3
Gascon, H.4
Rieck, K.5
Siemens, C.6
-
9
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
A. Bose, X. Hu, K. G. Shin, and T. Park. Behavioral detection of malware on mobile handsets. In MobiSys, pages 225-238, 2008.
-
(2008)
MobiSys
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
10
-
-
84879543890
-
Mast: Triage for market-scale mobile malware analysis
-
S. Chakradeo, B. Reaves, P. Traynor, and W. Enck. Mast: triage for market-scale mobile malware analysis. In WISEC, pages 13-24, 2013.
-
(2013)
WISEC
, pp. 13-24
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
11
-
-
84983751618
-
Contextual policy enforcement in Android applications with permission event graphs
-
K. Z. Chen, N. M. Johnson, V. D'Silva, S. Dai, K. MacNamara, T. Magrino, E. X. Wu, M. Rinard, and D. X. Song. Contextual policy enforcement in Android applications with permission event graphs. In NDSS, 2013.
-
(2013)
NDSS
-
-
Chen, K.Z.1
Johnson, N.M.2
D'Silva, V.3
Dai, S.4
MacNamara, K.5
Magrino, T.6
Wu, E.X.7
Rinard, M.8
Song, D.X.9
-
12
-
-
79961035117
-
Analyzing inter-application communication in Android
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In MobiSys, pages 239-252, 2011.
-
(2011)
MobiSys
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
13
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. X. Song, and R. E. Bryant. Semantics-aware malware detection. In Security and Privacy, pages 32-46, 2005.
-
(2005)
Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
14
-
-
84865590234
-
Attack of the clones: Detecting cloned applications on Android markets
-
J. Crussell, C. Gibler, and H. Chen. Attack of the clones: Detecting cloned applications on Android markets. In ESORICS, pages 37-54. 2012.
-
(2012)
ESORICS
, pp. 37-54
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
15
-
-
84978244413
-
Scalable semantics-based detection of similar Android applications
-
J. Crussell, C. Gibler, and H. Chen. Scalable semantics-based detection of similar Android applications. In ESORICS, 2013.
-
(2013)
ESORICS
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
16
-
-
84888331381
-
Pios: Detecting privacy leaks in ios applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting privacy leaks in ios applications. In NDSS, 2011.
-
(2011)
NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
17
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, pages 393-407, 2010.
-
(2010)
OSDI
, pp. 393-407
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
20
-
-
84889066310
-
-
Technical report, EC SPRIDE Technical Report
-
C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. Highly precise taint analysis for android application. Technical report, EC SPRIDE Technical Report, 2013.
-
(2013)
Highly Precise Taint Analysis for Android Application
-
-
Fritz, C.1
Arzt, S.2
Rasthofer, S.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
21
-
-
79955904273
-
-
Technical Report, Department of Computer Science, University of Maryland, College Park, November
-
A. P. Fuchs, A. Chaudhuri, and J. S. Foster. SCanDroid: Automated Security Certification of Android Applications. Technical Report CS-TR-4991, Department of Computer Science, University of Maryland, College Park, November 2009.
-
(2009)
SCanDroid: Automated Security Certification of Android Applications
-
-
Fuchs, A.P.1
Chaudhuri, A.2
Foster, J.S.3
-
22
-
-
84889046959
-
Structural detection of android malware using embedded call graphs
-
H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck. Structural detection of android malware using embedded call graphs. In AISec, pages 45-54, 2013.
-
(2013)
AISec
, pp. 45-54
-
-
Gascon, H.1
Yamaguchi, F.2
Arp, D.3
Rieck, K.4
-
23
-
-
84863084209
-
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale. In TRUST, pages 291-307, 2012.
-
(2012)
TRUST
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
24
-
-
84864334986
-
RiskRanker: Scalable and accurate zero-day Android malware detection
-
M. C. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: scalable and accurate zero-day Android malware detection. In MobiSys, pages 281-294, 2012.
-
(2012)
MobiSys
, pp. 281-294
-
-
Grace, M.C.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
25
-
-
76649141154
-
Automatic generation of string signatures for malware detection
-
K. Griffin, S. Schneider, X. Hu, and T. cker Chiueh. Automatic generation of string signatures for malware detection. In RAID, pages 101-120, 2009.
-
(2009)
RAID
, pp. 101-120
-
-
Griffin, K.1
Schneider, S.2
Hu, X.3
Cker Chiueh, T.4
-
26
-
-
84877942991
-
Slicing droids: Program slicing for smali code
-
J. Hoffmann, M. Ussath, T. Holz, and M. Spreitzenbarth. Slicing droids: program slicing for smali code. In SAC, pages 1844-1851, 2013.
-
(2013)
SAC
, pp. 1844-1851
-
-
Hoffmann, J.1
Ussath, M.2
Holz, T.3
Spreitzenbarth, M.4
-
28
-
-
84880090950
-
Hybrid context-sensitivity for points- to analysis
-
G. Kastrinis and Y. Smaragdakis. Hybrid context-sensitivity for points- to analysis. In PLDI, pages 423-434, 2013.
-
(2013)
PLDI
, pp. 423-434
-
-
Kastrinis, G.1
Smaragdakis, Y.2
-
29
-
-
84869416020
-
Chex: Statically vetting android apps for component hijacking vulnerabilities
-
L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: statically vetting android apps for component hijacking vulnerabilities. In ACM Conference on Computer and Communications Security, pages 229-240, 2012.
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 229-240
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
30
-
-
77957588309
-
Resolving and exploiting the k-cfa paradox: Illuminating functional vs object-oriented program analysis
-
M. Might, Y. Smaragdakis, and D. V. Horn. Resolving and exploiting the k-cfa paradox: illuminating functional vs. object-oriented program analysis. In PLDI, pages 305-315, 2010.
-
(2010)
PLDI
, pp. 305-315
-
-
Might, M.1
Smaragdakis, Y.2
Horn, D.V.3
-
31
-
-
13844296853
-
Parameterized object sensitivity for points- to analysis for Java
-
A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points- to analysis for Java. TOSEM, 14(1):1-41, 2005.
-
(2005)
TOSEM
, vol.14
, Issue.1
, pp. 1-41
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
32
-
-
85075955161
-
Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis
-
D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis. In USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Octeau, D.1
McDaniel, P.2
Jha, S.3
Bartel, A.4
Bodden, E.5
Klein, J.6
Traon, Y.L.7
-
33
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. S. Gates, B. P. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In ACM Conference on Computer and Communications Security, pages 241-252, 2012.
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 241-252
-
-
Peng, H.1
Gates, C.S.2
Sarma, B.P.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
34
-
-
84878002579
-
DroidChameleon: Evaluating Android anti-malware against transformation attacks
-
ACM
-
V. Rastogi, Y. Chen, and X. Jiang. DroidChameleon: evaluating Android anti-malware against transformation attacks. In ASIACCS, pages 329-334. ACM, 2013.
-
(2013)
ASIACCS
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
35
-
-
0001956132
-
Soot - A Java bytecode optimization framework
-
R. Vallée-Rai, P. Co, E. Gagnon, L. J. Hendren, P. Lam, and V. Sundaresan. Soot - a Java bytecode optimization framework. In CASCON, page 13, 1999.
-
(1999)
CASCON
, pp. 13
-
-
Vallée-Rai, R.1
Co, P.2
Gagnon, E.3
Hendren, L.J.4
Lam, P.5
Sundaresan, V.6
-
36
-
-
33646732224
-
Using datalog with binary decision diagrams for program analysis
-
J. Whaley, D. Avots, M. Carbin, and M. S. Lam. Using datalog with binary decision diagrams for program analysis. In APLAS, pages 97-118, 2005.
-
(2005)
APLAS
, pp. 97-118
-
-
Whaley, J.1
Avots, D.2
Carbin, M.3
Lam, M.S.4
-
37
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang. Vetting undesirable behaviors in android apps with permission use analysis. In ACM Conference on Computer and Communications Security, pages 611-622, 2013.
-
(2013)
ACM Conference on Computer and Communications Security
, pp. 611-622
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
Gu, G.5
Ning, P.6
Wang, X.S.7
Zang, B.8
-
38
-
-
84874828789
-
Fast, scalable detection of "piggybacked" mobile applications
-
W. Zhou, Y. Zhou, M. C. Grace, X. Jiang, and S. Zou. Fast, scalable detection of "piggybacked" mobile applications. In CODASPY, pages 185-196, 2013.
-
(2013)
CODASPY
, pp. 185-196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.C.3
Jiang, X.4
Zou, S.5
-
39
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party Android marketplaces
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party Android marketplaces. In CODASPY, pages 317-326, 2012.
-
(2012)
CODASPY
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
40
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012.
-
(2012)
NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|