-
1
-
-
84990038089
-
-
Android malware genome project. http://www.malgenomeproject.org
-
-
-
-
2
-
-
84866918123
-
Using gui ripping for automated testing of android applications
-
Amalfitano, D., Fasolino, A.R., Tramontana, P., De Carmine, S., Memon, A.M.: Using gui ripping for automated testing of android applications. In: International Conference on Automated Software Engineering (ASE) (2012)
-
(2012)
International Conference on Automated Software Engineering (ASE)
-
-
Amalfitano, D.1
Fasolino, A.R.2
Tramontana, P.3
De Carmine, S.4
Memon, A.M.5
-
3
-
-
84910658019
-
Drebin: Effective and explainable detection of android malware in your pocket
-
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: effective and explainable detection of android malware in your pocket. In: Network and Distributed System Security (NDSS)
-
Network and Distributed System Security (NDSS)
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
Siemens, C.6
-
4
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
ACM
-
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: ACM SIGPLAN Notices, vol. 49, pp. 259-269. ACM (2014)
-
(2014)
ACM SIGPLAN Notices
, vol.49
, pp. 259-269
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
6
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
ACM
-
Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73-84. ACM (2010)
-
(2010)
Proceedings of the 17Th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
Van Oorschot, P.C.3
Somayaji, A.4
-
7
-
-
84945177387
-
What the app. Is that? deception and countermeasures in the android user interface
-
Bianchi, A., Corbetta, J., Invernizzi, L., Fratantonio, Y., Kruegel, C., Vigna, G.: What the app. is that? deception and countermeasures in the android user interface. In: Symposium on Security and Privacy (SP) (2015)
-
(2015)
Symposium on Security and Privacy (SP)
-
-
Bianchi, A.1
Corbetta, J.2
Invernizzi, L.3
Fratantonio, Y.4
Kruegel, C.5
Vigna, G.6
-
8
-
-
84990049015
-
-
Buchner, J.: https://pypi.python.org/pypi/ImageHash
-
-
-
Buchner, J.1
-
9
-
-
85076271905
-
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
-
Chen, K., Wang, P., Lee, Y., Wang, X., Zhang, N., Huang, H., Zou, W., Liu, P.: Finding unknown malice in 10 seconds: mass vetting for new threats at the google-play scale. In: USENIX Security Symposium (2015)
-
(2015)
USENIX Security Symposium
-
-
Chen, K.1
Wang, P.2
Lee, Y.3
Wang, X.4
Zhang, N.5
Huang, H.6
Zou, W.7
Liu, P.8
-
10
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: Annual symposium on Computational Geometry (CG) (2004)
-
(2004)
Annual Symposium on Computational Geometry (CG)
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
11
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
ACM
-
Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the Twentieth Annual Symposium on Computational Geometry, pp. 253-262. ACM (2004)
-
(2004)
Proceedings of the Twentieth Annual Symposium on Computational Geometry
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
12
-
-
84986888961
-
Apposcopy: Semantics-based detection of android malware through static analysis
-
Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering
-
Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering
-
-
Feng, Y.1
Anand, S.2
Dillig, I.3
Aiken, A.4
-
13
-
-
79961080173
-
Vision: Automated security validation of mobile apps at app. markets
-
ACM
-
Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J.: Vision: automated security validation of mobile apps at app. markets. In: Proceedings of the Second International Workshop on Mobile Cloud Computing and Services, pp. 21-26. ACM (2011)
-
(2011)
Proceedings of the Second International Workshop on Mobile Cloud Computing and Services
, pp. 21-26
-
-
Gilbert, P.1
Chun, B.-G.2
Cox, L.P.3
Jung, J.4
-
14
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
-
Proceedings of the 10Th International Conference on Mobile Systems, Applications, and Services
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
Zou, S.4
Jiang, X.5
-
15
-
-
76649141154
-
Automatic generation of string signatures for malware detection
-
Kirda, E., Jha, S., Balzarotti, D. (eds.), Springer, Heidelberg
-
Griffin, K., Schneider, S., Hu, X., Chiueh, T.: Automatic generation of string signatures for malware detection. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 101-120. Springer, Heidelberg (2009)
-
(2009)
RAID 2009. LNCS
, vol.5758
, pp. 101-120
-
-
Griffin, K.1
Schneider, S.2
Hu, X.3
Chiueh, T.4
-
16
-
-
84875649563
-
Juxtapp: A scalable system for detecting code reuse among android applications
-
Flegel, U., Markatos, E., Robertson, W. (eds.), Springer, Heidelberg
-
Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: A scalable system for detecting code reuse among android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 62-81. Springer, Heidelberg (2013)
-
(2013)
DIMVA 2012. LNCS
, vol.7591
, pp. 62-81
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
18
-
-
84888862842
-
Identifying android malicious repackaged applications by thread-grained system call sequences
-
Lin, Y.-D., Lai, Y.-C., Chen, C.-H., Tsai, H.-C.: Identifying android malicious repackaged applications by thread-grained system call sequences. Comput. Secur. 39, 340-350 (2013)
-
(2013)
Comput. Secur
, vol.39
, pp. 340-350
-
-
Lin, Y.-D.1
Lai, Y.-C.2
Chen, C.-H.3
Tsai, H.-C.4
-
19
-
-
84990030708
-
-
Cryptology ePrint Archive, Report 2015/709
-
Malisa, L., Kostiainen, K., Capkun, S.: Detecting mobile application spoofing attacks by leveraging user visual similarity perception. Cryptology ePrint Archive, Report 2015/709 (2015). http://eprint.iacr.org
-
(2015)
Detecting mobile application spoofing attacks by leveraging user visual similarity perception
-
-
Malisa, L.1
Kostiainen, K.2
Capkun, S.3
-
21
-
-
84959337809
-
Baredroid: Large-scale analysis of android apps on real devices
-
ACM
-
Mutti, S., Fratantonio, Y., Bianchi, A., Invernizzi, L., Corbetta, J., Kirat, D., Kruegel, C., Vigna, G.: Baredroid: large-scale analysis of android apps on real devices. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 71-80. ACM (2015)
-
(2015)
Proceedings of the 31St Annual Computer Security Applications Conference
, pp. 71-80
-
-
Mutti, S.1
Fratantonio, Y.2
Bianchi, A.3
Invernizzi, L.4
Corbetta, J.5
Kirat, D.6
Kruegel, C.7
Vigna, G.8
-
22
-
-
84899458075
-
Guitar an innovative tool for automated testing of gui-driven software
-
Nguyen, B.N., Robbins, B., Banerjee, I., Memon, A.: Guitar an innovative tool for automated testing of gui-driven software. Autom. Softw. Eng. 21(1), 65-105 (2014)
-
(2014)
Autom. Softw. Eng
, vol.21
, Issue.1
, pp. 65-105
-
-
Nguyen, B.N.1
Robbins, B.2
Banerjee, I.3
Memon, A.4
-
24
-
-
84874865861
-
Appsplayground: Automatic security analysis of smartphone applications
-
ACM
-
Rastogi, V., Chen, Y., Enck, W.: Appsplayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 209-220. ACM (2013)
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
25
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: andromaly: A behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161-190 (2012)
-
(2012)
J. Intell. Inf. Syst
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
26
-
-
84990043712
-
-
March
-
Stefanko, L.: Android Banking Trojan, March 2016. http://www.welivesecurity.com/2016/03/09/android-trojan-targets-online-banking-users
-
(2016)
Android Banking Trojan
-
-
Stefanko, L.1
-
29
-
-
84896693973
-
Perceptual hashing for color images using invariant moments
-
Tang, Z., Dai, Y., Zhang, X.: Perceptual hashing for color images using invariant moments. Appl. Math 6(2S), 643S-650S (2012)
-
(2012)
Appl. Math
, vol.6
, Issue.2
, pp. 643S-650S
-
-
Tang, Z.1
Dai, Y.2
Zhang, X.3
-
31
-
-
84990036589
-
A5: Automated analysis of adversarial android applications
-
Vidas, T., Tan, J., Nahata, J., Tan, C.L., Christin, N., Tague, P.: A5: automated analysis of adversarial android applications. In: Proceedings of the 4th ACMWorkshop on Security and Privacy in Smartphones & Mobile Devices
-
Proceedings of the 4Th Acmworkshop on Security and Privacy in Smartphones & Mobile Devices
-
-
Vidas, T.1
Tan, J.2
Nahata, J.3
Tan, C.L.4
Christin, N.5
Tague, P.6
-
33
-
-
84874383552
-
A grey-box approach for automated GUI-model generation of mobile applications
-
Cortellessa, V., Varró, D. (eds.), Springer, Heidelberg
-
Yang, W., Prasad, M.R., Xie, T.: A grey-box approach for automated GUI-model generation of mobile applications. In: Cortellessa, V., Varró, D. (eds.) FASE 2013 (ETAPS 2013). LNCS, vol. 7793, pp. 250-265. Springer, Heidelberg (2013)
-
(2013)
FASE 2013 (ETAPS 2013). LNCS
, vol.7793
, pp. 250-265
-
-
Yang, W.1
Prasad, M.R.2
Xie, T.3
-
36
-
-
84907403322
-
Viewdroid: Towards obfuscationresilient mobile application repackaging detection
-
Zhang, F., Huang, H., Zhu, S., Wu, D., Liu, P.: Viewdroid: towards obfuscationresilient mobile application repackaging detection. In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (Wisec) (2014)
-
(2014)
ACM Conference on Security and Privacy in Wireless and Mobile Networks (Wisec)
-
-
Zhang, F.1
Huang, H.2
Zhu, S.3
Wu, D.4
Liu, P.5
-
38
-
-
84874828789
-
Fast, scalable detection of piggybacked mobile applications
-
ACM
-
Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of piggybacked mobile applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 185-196. ACM (2013)
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy
, pp. 185-196
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
39
-
-
84868252260
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy
-
Proceedings of the Second ACM Conference on Data and Application Security and Privacy
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
41
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS (2012)
-
(2012)
NDSS
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|