메뉴 건너뛰기




Volumn 16-21-November-2014, Issue , 2014, Pages 576-587

Apposcopy: Semantics-based detection of android malware through static analysis

Author keywords

Android; Inter component call graph; Taint analysis

Indexed keywords

ALGORITHMS; APPLICATION PROGRAMS; COMPUTER CRIME; DATA FLOW ANALYSIS; FLOW GRAPHS; MALWARE; SEMANTICS; SOFTWARE ENGINEERING; STATIC ANALYSIS;

EID: 84986888961     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2635868.2635869     Document Type: Conference Paper
Times cited : (409)

References (40)
  • 2
    • 84986903831 scopus 로고    scopus 로고
    • ProGuard. http://proguard.sourceforge.net/.
    • ProGuard1
  • 3
  • 5
    • 84986903835 scopus 로고    scopus 로고
    • VirusTotal. https://www.virustotal.com/en/.
    • VirusTotal1
  • 6
    • 84894158139 scopus 로고    scopus 로고
    • DroidAPIMiner: Mining API-level features for robust malware detection in Android
    • Y. Aafer, W. Du, and H. Yin. DroidAPIMiner: Mining API-level features for robust malware detection in Android. In SecureComm, 2013.
    • (2013) SecureComm
    • Aafer, Y.1    Du, W.2    Yin, H.3
  • 9
    • 57349125651 scopus 로고    scopus 로고
    • Behavioral detection of malware on mobile handsets
    • A. Bose, X. Hu, K. G. Shin, and T. Park. Behavioral detection of malware on mobile handsets. In MobiSys, pages 225-238, 2008.
    • (2008) MobiSys , pp. 225-238
    • Bose, A.1    Hu, X.2    Shin, K.G.3    Park, T.4
  • 10
    • 84879543890 scopus 로고    scopus 로고
    • Mast: Triage for market-scale mobile malware analysis
    • S. Chakradeo, B. Reaves, P. Traynor, and W. Enck. Mast: triage for market-scale mobile malware analysis. In WISEC, pages 13-24, 2013.
    • (2013) WISEC , pp. 13-24
    • Chakradeo, S.1    Reaves, B.2    Traynor, P.3    Enck, W.4
  • 12
    • 79961035117 scopus 로고    scopus 로고
    • Analyzing inter-application communication in Android
    • E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In MobiSys, pages 239-252, 2011.
    • (2011) MobiSys , pp. 239-252
    • Chin, E.1    Felt, A.P.2    Greenwood, K.3    Wagner, D.4
  • 14
    • 84865590234 scopus 로고    scopus 로고
    • Attack of the clones: Detecting cloned applications on Android markets
    • J. Crussell, C. Gibler, and H. Chen. Attack of the clones: Detecting cloned applications on Android markets. In ESORICS, pages 37-54. 2012.
    • (2012) ESORICS , pp. 37-54
    • Crussell, J.1    Gibler, C.2    Chen, H.3
  • 15
    • 84978244413 scopus 로고    scopus 로고
    • Scalable semantics-based detection of similar Android applications
    • J. Crussell, C. Gibler, and H. Chen. Scalable semantics-based detection of similar Android applications. In ESORICS, 2013.
    • (2013) ESORICS
    • Crussell, J.1    Gibler, C.2    Chen, H.3
  • 16
    • 84888331381 scopus 로고    scopus 로고
    • Pios: Detecting privacy leaks in ios applications
    • M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting privacy leaks in ios applications. In NDSS, 2011.
    • (2011) NDSS
    • Egele, M.1    Kruegel, C.2    Kirda, E.3    Vigna, G.4
  • 17
    • 85076889619 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, pages 393-407, 2010.
    • (2010) OSDI , pp. 393-407
    • Enck, W.1    Gilbert, P.2    Gon Chun, B.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 22
    • 84889046959 scopus 로고    scopus 로고
    • Structural detection of android malware using embedded call graphs
    • H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck. Structural detection of android malware using embedded call graphs. In AISec, pages 45-54, 2013.
    • (2013) AISec , pp. 45-54
    • Gascon, H.1    Yamaguchi, F.2    Arp, D.3    Rieck, K.4
  • 23
    • 84863084209 scopus 로고    scopus 로고
    • AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen. AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale. In TRUST, pages 291-307, 2012.
    • (2012) TRUST , pp. 291-307
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 24
    • 84864334986 scopus 로고    scopus 로고
    • RiskRanker: Scalable and accurate zero-day Android malware detection
    • M. C. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: scalable and accurate zero-day Android malware detection. In MobiSys, pages 281-294, 2012.
    • (2012) MobiSys , pp. 281-294
    • Grace, M.C.1    Zhou, Y.2    Zhang, Q.3    Zou, S.4    Jiang, X.5
  • 25
    • 76649141154 scopus 로고    scopus 로고
    • Automatic generation of string signatures for malware detection
    • K. Griffin, S. Schneider, X. Hu, and T. cker Chiueh. Automatic generation of string signatures for malware detection. In RAID, pages 101-120, 2009.
    • (2009) RAID , pp. 101-120
    • Griffin, K.1    Schneider, S.2    Hu, X.3    Cker Chiueh, T.4
  • 26
    • 84877942991 scopus 로고    scopus 로고
    • Slicing droids: Program slicing for smali code
    • J. Hoffmann, M. Ussath, T. Holz, and M. Spreitzenbarth. Slicing droids: program slicing for smali code. In SAC, pages 1844-1851, 2013.
    • (2013) SAC , pp. 1844-1851
    • Hoffmann, J.1    Ussath, M.2    Holz, T.3    Spreitzenbarth, M.4
  • 28
    • 84880090950 scopus 로고    scopus 로고
    • Hybrid context-sensitivity for points- to analysis
    • G. Kastrinis and Y. Smaragdakis. Hybrid context-sensitivity for points- to analysis. In PLDI, pages 423-434, 2013.
    • (2013) PLDI , pp. 423-434
    • Kastrinis, G.1    Smaragdakis, Y.2
  • 30
    • 77957588309 scopus 로고    scopus 로고
    • Resolving and exploiting the k-cfa paradox: Illuminating functional vs object-oriented program analysis
    • M. Might, Y. Smaragdakis, and D. V. Horn. Resolving and exploiting the k-cfa paradox: illuminating functional vs. object-oriented program analysis. In PLDI, pages 305-315, 2010.
    • (2010) PLDI , pp. 305-315
    • Might, M.1    Smaragdakis, Y.2    Horn, D.V.3
  • 31
    • 13844296853 scopus 로고    scopus 로고
    • Parameterized object sensitivity for points- to analysis for Java
    • A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points- to analysis for Java. TOSEM, 14(1):1-41, 2005.
    • (2005) TOSEM , vol.14 , Issue.1 , pp. 1-41
    • Milanova, A.1    Rountev, A.2    Ryder, B.G.3
  • 32
    • 85075955161 scopus 로고    scopus 로고
    • Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis
    • D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis. In USENIX Security Symposium, 2013.
    • (2013) USENIX Security Symposium
    • Octeau, D.1    McDaniel, P.2    Jha, S.3    Bartel, A.4    Bodden, E.5    Klein, J.6    Traon, Y.L.7
  • 34
    • 84878002579 scopus 로고    scopus 로고
    • DroidChameleon: Evaluating Android anti-malware against transformation attacks
    • ACM
    • V. Rastogi, Y. Chen, and X. Jiang. DroidChameleon: evaluating Android anti-malware against transformation attacks. In ASIACCS, pages 329-334. ACM, 2013.
    • (2013) ASIACCS , pp. 329-334
    • Rastogi, V.1    Chen, Y.2    Jiang, X.3
  • 36
    • 33646732224 scopus 로고    scopus 로고
    • Using datalog with binary decision diagrams for program analysis
    • J. Whaley, D. Avots, M. Carbin, and M. S. Lam. Using datalog with binary decision diagrams for program analysis. In APLAS, pages 97-118, 2005.
    • (2005) APLAS , pp. 97-118
    • Whaley, J.1    Avots, D.2    Carbin, M.3    Lam, M.S.4
  • 38
    • 84874828789 scopus 로고    scopus 로고
    • Fast, scalable detection of "piggybacked" mobile applications
    • W. Zhou, Y. Zhou, M. C. Grace, X. Jiang, and S. Zou. Fast, scalable detection of "piggybacked" mobile applications. In CODASPY, pages 185-196, 2013.
    • (2013) CODASPY , pp. 185-196
    • Zhou, W.1    Zhou, Y.2    Grace, M.C.3    Jiang, X.4    Zou, S.5
  • 39
    • 85137132511 scopus 로고    scopus 로고
    • Detecting repackaged smartphone applications in third-party Android marketplaces
    • W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party Android marketplaces. In CODASPY, pages 317-326, 2012.
    • (2012) CODASPY , pp. 317-326
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3    Ning, P.4
  • 40
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012.
    • (2012) NDSS
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.