-
1
-
-
85019926235
-
-
Smartphone OS Market Share, Q2. URL.
-
Smartphone OS Market Share, Q2 2016. URL http://www.idc.com/prodserv/smartphone-os-market-share.jsp.
-
(2016)
-
-
-
2
-
-
85019866478
-
-
Android Apps on Google Play. URL.
-
Android Apps on Google Play. URL https://play.google.com/store?hl=en.
-
-
-
-
3
-
-
85019866505
-
-
Number of available Android applications - AppBrain. URL.
-
Number of available Android applications - AppBrain. URL http://www.appbrain.com/stats/number-of-Android-apps.
-
-
-
-
4
-
-
85019898474
-
-
Anzhi market. URL.
-
Anzhi market. URL http://www.anzhi.com/.
-
-
-
-
5
-
-
85019946595
-
-
Appchina market. URL.
-
Appchina market. URL http://www.appchina.com/.
-
-
-
-
6
-
-
85019870224
-
INTERPOL, Mobile Cyber Threats - Kaspersky Lab and INTERPOL Joint Report, Tech. Rep.
-
Kaspersky and INTERPOL URL
-
Kaspersky, INTERPOL, Mobile Cyber Threats - Kaspersky Lab and INTERPOL Joint Report, Tech. Rep.,., 2014, Kaspersky and INTERPOL URL http://media.kaspersky.com/pdf/Kaspersky-Lab-KSN-Report-mobile-cyberthreats-web.pdf.
-
(2014)
-
-
Kaspersky1
-
7
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to Android
-
in: CCS’10
-
D. Barrera, H.G. Kayacik, P.C. van Oorschot, A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to Android, in: CCS’10, 2010, pp. 73–84. http://dx.doi.org/10.1145/1866307.1866317.
-
(2010)
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
van Oorschot, P.C.3
Somayaji, A.4
-
8
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
SOUPS’12
-
A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, D. Wagner, Android permissions: User attention, comprehension, and behavior, in: SOUPS’12, 2012. http://dx.doi.org/10.1145/2335356.2335360.
-
(2012)
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
9
-
-
84908058224
-
Exploring permission-induced risk in Android applications for malicious application detection
-
Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X., Exploring permission-induced risk in Android applications for malicious application detection. Trans. Inf. Forensics Secur. 9:11 (2014), 1869–1882, 10.1109/TIFS.2014.2353996.
-
(2014)
Trans. Inf. Forensics Secur.
, vol.9
, Issue.11
, pp. 1869-1882
-
-
Wang, W.1
Wang, X.2
Feng, D.3
Liu, J.4
Han, Z.5
Zhang, X.6
-
10
-
-
84860675513
-
Permission re-delegation: attacks and defenses
-
SEC’11
-
A.P. Felt, H.J. Wang, A. Moshchuk, S. Hanna, E. Chin, Permission re-delegation: attacks and defenses, in: SEC’11.
-
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
11
-
-
84869416020
-
CHEX: statically vetting Android apps for component hijacking vulnerabilities
-
CCS’12
-
L. Lu, Z. Li, Z. Wu, W. Lee, G. Jiang, CHEX: statically vetting Android apps for component hijacking vulnerabilities, in: CCS’12. http://dx.doi.org/10.1145/2382196.2382223.
-
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.5
-
12
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for Android devices
-
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y., Andromaly: A behavioral malware detection framework for Android devices. J. Intell. Inf. Syst. 38:1 (2012), 161–190, 10.1007/s10844-010-0148-x.
-
(2012)
J. Intell. Inf. Syst.
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
13
-
-
84869432690
-
Using probabilistic generative models for ranking risks of Android apps
-
CCS’12
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, I. Molloy, Using probabilistic generative models for ranking risks of Android apps, in: CCS’12. http://dx.doi.org/10.1145/2382196.2382224.
-
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
14
-
-
84864033989
-
Android permissions: a perspective combining risks and benefits
-
SACMAT’12.
-
B.P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, I. Molloy, Android permissions: a perspective combining risks and benefits, in: SACMAT’12. http://dx.doi.org/10.1145/2295136.2295141.
-
-
-
Sarma, B.P.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
15
-
-
84869439259
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
-
NDSS’12.
-
Y. Zhou, W. Zhi, Z. Wu, X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets, in: NDSS’12.
-
-
-
Zhou, Y.1
Zhi, W.2
Wu, Z.3
Jiang, X.4
-
16
-
-
84889046959
-
Structural detection of Android malware using embedded call graphs
-
AISec’13.
-
H. Gascon, F. Yamaguchi, D. Arp, K. Rieck, Structural detection of Android malware using embedded call graphs, in: AISec’13. http://dx.doi.org/10.1145/2517312.2517315.
-
-
-
Gascon, H.1
Yamaguchi, F.2
Arp, D.3
Rieck, K.4
-
17
-
-
84910658019
-
Drebin: Effective and explainable detection of Android malware in your pocket
-
NDSS’14.
-
D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, K. Rieck, Drebin: Effective and explainable detection of Android malware in your pocket, in: NDSS’14.
-
-
-
Arp, D.1
Spreitzenbarth, M.2
Hübner, M.3
Gascon, H.4
Rieck, K.5
-
18
-
-
84879543890
-
MAST: Triage for market-scale mobile malware analysis
-
WiSec’13.
-
S. Chakradeo, B. Reaves, P. Traynor, W. Enck, MAST: Triage for market-scale mobile malware analysis, in: WiSec’13. http://dx.doi.org/10.1145/2462096.2462100.
-
-
-
Chakradeo, S.1
Reaves, B.2
Traynor, P.3
Enck, W.4
-
19
-
-
79959456761
-
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
OSDI’10.
-
W. Enck, P. Gilbert, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, A.N. Sheth, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, in: OSDI’10.
-
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
20
-
-
84907029013
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps
-
in: PLDI’14
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, P. McDaniel, Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps, in: PLDI’14. http://dx.doi.org/10.1145/2594291.2594299.
-
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
21
-
-
84878368035
-
Dissecting Android malware: Characterization and evolution
-
S&P’12
-
Y. Zhou, X. Jiang, Dissecting Android malware: Characterization and evolution, in: S&P’12. http://dx.doi.org/10.1109/SP.2012.16.
-
-
-
Zhou, Y.1
Jiang, X.2
-
22
-
-
84860679345
-
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
-
WiSec’13
-
Z. Xu, K. Bai, S. Zhu, Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors, in: WiSec’13. http://dx.doi.org/10.1145/2185448.2185465.
-
-
-
Xu, Z.1
Bai, K.2
Zhu, S.3
-
23
-
-
84920790174
-
Gyrophone: Recognizing speech from gyroscope signals
-
SEC’14.
-
Y. Michalevsky, D. Boneh, G. Nakibly, Gyrophone: Recognizing speech from gyroscope signals, in: SEC’14.
-
-
-
Michalevsky, Y.1
Boneh, D.2
Nakibly, G.3
-
24
-
-
85025148063
-
Droidapiminer: Mining api-level features for robust malware detection in Android
-
Springer
-
Aafer, Y., Du, W., Yin, H., Droidapiminer: Mining api-level features for robust malware detection in Android. Security and Privacy in Communication Networks, 2013, Springer, 86–103, 10.1007/978-3-319-04283-1_6.
-
(2013)
Security and Privacy in Communication Networks
, pp. 86-103
-
-
Aafer, Y.1
Du, W.2
Yin, H.3
-
25
-
-
85019842706
-
-
< uses-feature >∣ Android Developers. URL.
-
< uses-feature >∣ Android Developers. URL http://developer.Android.com/guide/topics/manifest/uses-feature-element.html.
-
-
-
-
26
-
-
84869388345
-
PScout: analyzing the Android permission specification
-
CCS’12.
-
K.W.Y. Au, Y.F. Zhou, Z. Huang, D. Lie, PScout: analyzing the Android permission specification, in: CCS’12. http://dx.doi.org/10.1145/2382196.2382222.
-
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Lie, D.4
-
27
-
-
50949133669
-
LIBLINEAR: A library for large linear classification
-
Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J., LIBLINEAR: A library for large linear classification. J. Mach. Learn. Res. 9 (2008), 1871–1874.
-
(2008)
J. Mach. Learn. Res.
, vol.9
, pp. 1871-1874
-
-
Fan, R.-E.1
Chang, K.-W.2
Hsieh, C.-J.3
Wang, X.-R.4
Lin, C.-J.5
-
28
-
-
0003500248
-
C4.5: Programs for Machine Learning
-
Morgan Kaufmann Publishers Inc. San Francisco, CA, USA
-
Quinlan, J.R., C4.5: Programs for Machine Learning. 1993, Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
-
(1993)
-
-
Quinlan, J.R.1
-
29
-
-
85019932977
-
-
Myapp market. URL.
-
Myapp market. URL http://Android.myapp.com/.
-
-
-
-
30
-
-
85019872456
-
-
Lenovomm market. URL.
-
Lenovomm market. URL http://www.lenovomm.com/.
-
-
-
-
31
-
-
85019921110
-
-
Gfan market. URL.
-
Gfan market. URL http://app.gfan.com/.
-
-
-
-
32
-
-
85019856867
-
-
Nduoa market. URL.
-
Nduoa market. URL http://nduoa.com/.
-
-
-
-
33
-
-
85019853456
-
-
VirusTotal - free online virus, malware and URL scanner. URL.
-
VirusTotal - free online virus, malware and URL scanner. URL https://www.virustotal.com/.
-
-
-
-
34
-
-
85019916788
-
-
VirusShare.com URL.
-
VirusShare.com URL http://virusshare.com/.
-
-
-
-
35
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
http://dx.doi.org/10.1145/1961189.1961199 software available at URL.
-
Chang, C.-C., Lin, C.-J., LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol., 2, 2011 software available at URL http://www.csie.ntu.edu.tw/~cjlin/libsvm. http://dx.doi.org/10.1145/1961189.1961199.
-
(2011)
ACM Trans. Intell. Syst. Technol.
, vol.2
-
-
Chang, C.-C.1
Lin, C.-J.2
-
36
-
-
80555140075
-
Scikit-learn: Machine learning in Python
-
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E., Scikit-learn: Machine learning in Python. J. Mach. Learn. Res. 12 (2011), 2825–2830.
-
(2011)
J. Mach. Learn. Res.
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
Varoquaux, G.2
Gramfort, A.3
Michel, V.4
Thirion, B.5
Grisel, O.6
Blondel, M.7
Prettenhofer, P.8
Weiss, R.9
Dubourg, V.10
Vanderplas, J.11
Passos, A.12
Cournapeau, D.13
Brucher, M.14
Perrot, M.15
Duchesnay, E.16
-
37
-
-
84885406698
-
Gnu parallel-the command-line power tool
-
Tange, O., Gnu parallel-the command-line power tool. USENIX Mag. 36:1 (2011), 42–47.
-
(2011)
USENIX Mag.
, vol.36
, Issue.1
, pp. 42-47
-
-
Tange, O.1
-
38
-
-
84868259476
-
Droidmat: Android malware detection through manifest and api calls tracing
-
Asia JCIS’12.
-
D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, K.-P. Wu, Droidmat: Android malware detection through manifest and api calls tracing, in: Asia JCIS’12. http://dx.doi.org/10.1109/AsiaJCIS.2012.18.
-
-
-
Wu, D.-J.1
Mao, C.-H.2
Wei, T.-E.3
Lee, H.-M.4
Wu, K.-P.5
-
39
-
-
70449372975
-
Effect of errors in ground truth on classification accuracy
-
Carlotto, M.J., Effect of errors in ground truth on classification accuracy. Int. J. Remote Sens. 30:18 (2009), 4831–4849.
-
(2009)
Int. J. Remote Sens.
, vol.30
, Issue.18
, pp. 4831-4849
-
-
Carlotto, M.J.1
-
40
-
-
84861302816
-
Is this app safe?: A large scale study on application permissions and risk signals
-
WWW’12.
-
P.H. Chia, Y. Yamamoto, N. Asokan, Is this app safe?: A large scale study on application permissions and risk signals, in: WWW’12. http://dx.doi.org/10.1145/2187836.2187879.
-
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
41
-
-
84899029401
-
WHYPER: Towards automating risk assessment of mobile applications
-
SEC’13.
-
R. Pandita, X. Xiao, W. Yang, W. Enck, T. Xie, WHYPER: Towards automating risk assessment of mobile applications, in: SEC’13.
-
-
-
Pandita, R.1
Xiao, X.2
Yang, W.3
Enck, W.4
Xie, T.5
-
42
-
-
84993660403
-
Checking app behavior against app descriptions
-
ICSE’14.
-
A. Gorla, I. Tavecchia, F. Gross, A. Zeller, Checking app behavior against app descriptions, in: ICSE’14. http://dx.doi.org/10.1145/2568225.2568276.
-
-
-
Gorla, A.1
Tavecchia, I.2
Gross, F.3
Zeller, A.4
-
43
-
-
84874080269
-
Mining permission request patterns from Android and facebook applications
-
ICDM’12.
-
M. Frank, B. Dong, A.P. Felt, D. Song, Mining permission request patterns from Android and facebook applications, in: ICDM’12. http://dx.doi.org/10.1109/ICDM.2012.86.
-
-
-
Frank, M.1
Dong, B.2
Felt, A.P.3
Song, D.4
-
44
-
-
84897734703
-
Machine learning for Android malware detection using permission and API calls
-
ICTAI’13.
-
N. Peiravian, X. Zhu, Machine learning for Android malware detection using permission and API calls, in: ICTAI’13. http://dx.doi.org/10.1109/ICTAI.2013.53.
-
-
-
Peiravian, N.1
Zhu, X.2
-
45
-
-
84874835750
-
AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users
-
CODASPY’13.
-
S. Rosen, Z. Qian, Z.M. Mao, AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users, in: CODASPY’13. http://dx.doi.org/10.1145/2435349.2435380.
-
-
-
Rosen, S.1
Qian, Z.2
Mao, Z.M.3
-
46
-
-
84961574697
-
Effectiveness of opcode ngrams for detection of multi family Android malware
-
Availability, Reliability and Security (ARES), 10th International Conference on, 2015, pp.
-
G. Canfora, A.D. Lorenzo, E. Medvet, F. Mercaldo, C.A. Visaggio, Effectiveness of opcode ngrams for detection of multi family Android malware, in: Availability, Reliability and Security (ARES), 2015 10th International Conference on, 2015, pp. 333–340. http://dx.doi.org/10.1109/ARES.2015.57.
-
(2015)
, pp. 333-340
-
-
Canfora, G.1
Lorenzo, A.D.2
Medvet, E.3
Mercaldo, F.4
Visaggio, C.A.5
-
47
-
-
84888348488
-
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families
-
Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Blasco, J., Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families. Expert Syst. Appl. 41:4 (2014), 1104–1117.
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.4
, pp. 1104-1117
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris-Lopez, P.3
Blasco, J.4
-
48
-
-
84872224783
-
Madam: A multi-level anomaly detector for Android malware
-
Springer
-
Dini, G., Martinelli, F., Saracino, A., Sgandurra, D., Madam: A multi-level anomaly detector for Android malware. MMM-ACNS, Vol. 12, 2012, Springer, 240–253, 10.1007/978-3-642-33704-8_21.
-
(2012)
MMM-ACNS, Vol. 12
, pp. 240-253
-
-
Dini, G.1
Martinelli, F.2
Saracino, A.3
Sgandurra, D.4
-
49
-
-
80755143401
-
Crowdroid: behavior-based malware detection system for Android
-
SPSM’11
-
I. Burguera, U. Zurutuza, S. Nadjm-Tehrani, Crowdroid: behavior-based malware detection system for Android, in: SPSM’11. http://dx.doi.org/10.1145/2046614.2046619.
-
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
50
-
-
84883095467
-
Networkprofiler: Towards automatic fingerprinting of Android apps
-
INFOCOM’13.
-
S. Dai, A. Tongaonkar, X. Wang, A. Nucci, D. Song, Networkprofiler: Towards automatic fingerprinting of Android apps, in: INFOCOM’13. http://dx.doi.org/10.1109/INFCOM.2013.6566868.
-
-
-
Dai, S.1
Tongaonkar, A.2
Wang, X.3
Nucci, A.4
Song, D.5
-
51
-
-
85019925991
-
-
Copperdroid: Automatic reconstruction of Android malware behaviors., in: NDSS
-
K. Tam, S.J. Khan, A. Fattori, L. Cavallaro, Copperdroid: Automatic reconstruction of Android malware behaviors., in: NDSS, 2015.
-
(2015)
-
-
Tam, K.1
Khan, S.J.2
Fattori, A.3
Cavallaro, L.4
-
52
-
-
85040734343
-
Madam: Effective and efficient behavior-based Android malware detection and prevention
-
1–1
-
Saracino, A., Sgandurra, D., Dini, G., Martinelli, F., Madam: Effective and efficient behavior-based Android malware detection and prevention. IEEE Trans. Dependable Secure Comput., PP(99), 2016, 10.1109/TDSC.2016.2536605 1–1.
-
(2016)
IEEE Trans. Dependable Secure Comput.
, vol.PP
, Issue.99
-
-
Saracino, A.1
Sgandurra, D.2
Dini, G.3
Martinelli, F.4
-
53
-
-
74049155830
-
On lightweight mobile phone application certification
-
CCS’09.
-
W. Enck, M. Ongtang, P. McDaniel, On lightweight mobile phone application certification, in: CCS’09. http://dx.doi.org/10.1145/1653662.1653691.
-
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
54
-
-
77954487766
-
Apex: extending Android permission model and enforcement with user-defined runtime constraints
-
AsiaCCS’10.
-
M. Nauman, S. Khan, X. Zhang, Apex: extending Android permission model and enforcement with user-defined runtime constraints, in: AsiaCCS’10. http://dx.doi.org/10.1145/1755688.1755732.
-
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
55
-
-
80755167433
-
Xmandroid: A new Android evolution to mitigate privilege escalation attacks, Technische Universität Darmstadt
-
Technical Report TR-2011-04.
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, Xmandroid: A new Android evolution to mitigate privilege escalation attacks, Technische Universität Darmstadt, Technical Report TR-2011-04.
-
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
56
-
-
84862082806
-
Semantically rich application-centric security in Android
-
Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P., Semantically rich application-centric security in Android. Secur. Commun. Netw. 5:6 (2012), 658–673, 10.1002/sec.360.
-
(2012)
Secur. Commun. Netw.
, vol.5
, Issue.6
, pp. 658-673
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
57
-
-
85019872422
-
-
Security enhanced (se) Android: Bringing flexible mac to Android, in: NDSS’13
-
S. Smalley, R. Craig, Security enhanced (se) Android: Bringing flexible mac to Android, in: NDSS’13.
-
-
-
Smalley, S.1
Craig, R.2
-
58
-
-
84889041424
-
Appintent: Analyzing sensitive data transmission in Android for privacy leakage detection
-
CCS’13
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, X.S. Wang, Appintent: Analyzing sensitive data transmission in Android for privacy leakage detection, in: CCS’13. http://dx.doi.org/10.1145/2508859.2516676.
-
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X.S.6
-
59
-
-
84943159826
-
Iccta: detecting inter-component privacy leaks in Android apps
-
in: ICSE’15
-
L. Li, A. Bartel, T.F.D.A. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, P. McDaniel, Iccta: detecting inter-component privacy leaks in Android apps, in: ICSE’15.
-
-
-
Li, L.1
Bartel, A.2
Bissyande, T.F.D.A.3
Klein, J.4
Le Traon, Y.5
Arzt, S.6
Rasthofer, S.7
Bodden, E.8
Octeau, D.9
McDaniel, P.10
-
60
-
-
84910617173
-
Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps
-
in: CCS’14
-
F. Wei, S. Roy, X. Ou, et al. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps, in: CCS’14. http://dx.doi.org/10.1145/2660267.2660357.
-
-
-
Wei, F.1
Roy, S.2
Ou, X.3
-
61
-
-
85015638536
-
Discovering and understanding Android sensor usage behaviors with data flow analysis
-
Liu, X., Liu, J., Wang, W., He, Y., Zhang, X., Discovering and understanding Android sensor usage behaviors with data flow analysis. World Wide Web, 2017, 1–22, 10.1007/s11280-017-0446-0.
-
(2017)
World Wide Web
, pp. 1-22
-
-
Liu, X.1
Liu, J.2
Wang, W.3
He, Y.4
Zhang, X.5
-
62
-
-
85019903808
-
Alde: privacy risk analysis of analytics libraries in the Android ecosystem
-
X. Liu, S. Zhu, W. Wang, J. Liu, Alde: privacy risk analysis of analytics libraries in the Android ecosystem, in: 12th EAI International Conference on Security and Privacy in Communication Networks, SecureComm, 2016.
-
(2016)
12th EAI International Conference on Security and Privacy in Communication Networks, SecureComm
-
-
Liu, X.1
Zhu, S.2
Wang, W.3
Liu, J.4
-
63
-
-
84901587738
-
A machine-learning approach for classifying and categorizing Android sources and sinks
-
NDSS’14
-
S. Rasthofer, S. Arzt, E. Bodden, A machine-learning approach for classifying and categorizing Android sources and sinks, in: NDSS’14.
-
-
-
Rasthofer, S.1
Arzt, S.2
Bodden, E.3
-
64
-
-
85015148814
-
Anomadroid: Profiling Android applications’ behaviors for identifying unknown malapps
-
2016 IEEE Trustcom/BigDataSE/ISPA, pp.
-
D. Su, W. Wang, X. Wang, J. Liu, Anomadroid: Profiling Android applications’ behaviors for identifying unknown malapps, in: 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, pp. 691–698. http://dx.doi.org/10.1109/TrustCom.2016.0127.
-
(2016)
, pp. 691-698
-
-
Su, D.1
Wang, W.2
Wang, X.3
Liu, J.4
-
65
-
-
85011337840
-
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
-
Wang, W., Li, Y., Wang, X., Liu, J., Zhang, X., Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.01.019.
-
(2017)
Future Gener. Comput. Syst.
-
-
Wang, W.1
Li, Y.2
Wang, X.3
Liu, J.4
Zhang, X.5
|