메뉴 건너뛰기




Volumn , Issue 1, 2014, Pages 1036-1046

AsDroid: Detecting stealthy behaviors in Android applications by user interface and program behavior contradiction

Author keywords

Android; Program Behavior Contradiction; Stealthy Behaviors; User Interface

Indexed keywords

ANDROID (OPERATING SYSTEM); APPLICATION PROGRAMS; BEHAVIORAL RESEARCH; MALWARE; SEMANTICS; SOFTWARE ENGINEERING;

EID: 84994129817     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2568225.2568301     Document Type: Conference Paper
Times cited : (201)

References (35)
  • 2
  • 4
    • 84994148851 scopus 로고    scopus 로고
    • Wandoujia. http: //www. wandoujia. com/apps/.
  • 7
    • 84994076754 scopus 로고    scopus 로고
    • Mobile security catching up revealing the nuts and bolts of the security of mobile devices
    • M. Becher, F. C. Freiling, J. Homann, T. Holz, S. Uellenbeck, and C. Wolf. Mobile security catching up revealing the nuts and bolts of the security of mobile devices. In S&P'11.
    • S&P'11
    • Becher, M.1    Freiling, F.C.2    Homann, J.3    Holz, T.4    Uellenbeck, S.5    Wolf, C.6
  • 9
    • 84877931620 scopus 로고    scopus 로고
    • User-centric dependence analysis for identifying malicious mobile apps
    • K. Elish, D. D. Yao, and B. G. Ryder. User-centric dependence analysis for identifying malicious mobile apps. In MoST'12.
    • MoST'12
    • Elish, K.1    Yao, D.D.2    Ryder, B.G.3
  • 15
    • 84877950290 scopus 로고    scopus 로고
    • AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen. AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale. In TRUST'12.
    • TRUST'12
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 16
    • 79961080173 scopus 로고    scopus 로고
    • Vision: Automated security validation of mobile apps at app markets
    • P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung. Vision: automated security validation of mobile apps at app markets. In MCS'11.
    • MCS'11
    • Gilbert, P.1    Chun, B.-G.2    Cox, L.P.3    Jung, J.4
  • 18
  • 19
    • 15744373601 scopus 로고    scopus 로고
    • Trojan: Trojans & spyware: An electronic achilles
    • Mar.
    • P. Gosling. Trojan: Trojans & spyware: an electronic achilles. Netw. Secur., 2005 (3): 17-18, Mar. 2005.
    • (2005) Netw. Secur , vol.2005 , Issue.3 , pp. 17-18
    • Gosling, P.1
  • 21
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrotting Android to protect data from imperious applications
    • P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrotting Android to protect data from imperious applications. In CCS'11.
    • CCS'11
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 25
    • 84994075167 scopus 로고    scopus 로고
    • Is it harder to parse Chinese, or the Chinese Treebank
    • R. Levy and C. D. Manning. Is it harder to parse Chinese, or the Chinese Treebank In ACL'03.
    • ACL'03
    • Levy, R.1    Manning, C.D.2
  • 28
    • 84904692139 scopus 로고    scopus 로고
    • National Taiwan University
    • National Taiwan University. Chinese wordnet. http: //lope. linguistics. ntu. edu. tw/cwm/.
    • Chinese Wordnet
  • 29
    • 85075955161 scopus 로고    scopus 로고
    • Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysi
    • D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysi. In USENIX Security'13.
    • USENIX Security'13
    • Octeau, D.1    McDaniel, P.2    Jha, S.3    Bartel, A.4    Bodden, E.5    Klein, J.6    Traon, Y.L.7
  • 31
    • 84994074193 scopus 로고    scopus 로고
    • pxb1988. dex2jar: Tools to work with android dex and Java class files
    • pxb1988. dex2jar: Tools to work with android. dex and Java. class files. http: //code. google. com/p/dex2jar/.
  • 32
    • 84994126703 scopus 로고    scopus 로고
    • TrendLabs. 3Q 2012 security roundup-Android under siege: Popularity comes at a price
    • TrendLabs. 3Q 2012 security roundup-Android under siege: Popularity comes at a price. http: //www. trendmicro. com/us/security-intelligence/.
  • 33
    • 84865295917 scopus 로고    scopus 로고
    • Finding errors in multithreaded GUI applications
    • S. Zhang, H. Lu, and M. D. Ernst. Finding errors in multithreaded GUI applications. In ISSTA'12.
    • ISSTA'12
    • Zhang, S.1    Lu, H.2    Ernst, M.D.3
  • 34
    • 84906485726 scopus 로고    scopus 로고
    • Dissecting Android malware: Characterization and evolution
    • Y. Zhou and X. Jiang. Dissecting Android malware: Characterization and evolution. In S&P'12.
    • S&P'12
    • Zhou, Y.1    Jiang, X.2
  • 35
    • 84994132940 scopus 로고    scopus 로고
    • Hey, you, get o of my market: Detecting malicious apps in oficial and alternative Android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get o of my market: Detecting malicious apps in oficial and alternative Android markets. In NDSS'12.
    • NDSS'12
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.