메뉴 건너뛰기




Volumn 75, Issue , 2017, Pages 30-45

Characterizing Android apps’ behavior for effective detection of malapps at large scale

Author keywords

Android; Feature comparison; Malicious apps detection

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMMERCE; DECISION TREES; FEATURE EXTRACTION; REGRESSION ANALYSIS;

EID: 85019842481     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.04.041     Document Type: Article
Times cited : (79)

References (65)
  • 1
    • 85019926235 scopus 로고    scopus 로고
    • Smartphone OS Market Share, Q2. URL.
    • Smartphone OS Market Share, Q2 2016. URL http://www.idc.com/prodserv/smartphone-os-market-share.jsp.
    • (2016)
  • 2
    • 85019866478 scopus 로고    scopus 로고
    • Android Apps on Google Play. URL.
    • Android Apps on Google Play. URL https://play.google.com/store?hl=en.
  • 3
    • 85019866505 scopus 로고    scopus 로고
    • Number of available Android applications - AppBrain. URL.
    • Number of available Android applications - AppBrain. URL http://www.appbrain.com/stats/number-of-Android-apps.
  • 4
    • 85019898474 scopus 로고    scopus 로고
    • Anzhi market. URL.
    • Anzhi market. URL http://www.anzhi.com/.
  • 5
    • 85019946595 scopus 로고    scopus 로고
    • Appchina market. URL.
    • Appchina market. URL http://www.appchina.com/.
  • 6
    • 85019870224 scopus 로고    scopus 로고
    • INTERPOL, Mobile Cyber Threats - Kaspersky Lab and INTERPOL Joint Report, Tech. Rep.
    • Kaspersky and INTERPOL URL
    • Kaspersky, INTERPOL, Mobile Cyber Threats - Kaspersky Lab and INTERPOL Joint Report, Tech. Rep.,., 2014, Kaspersky and INTERPOL URL http://media.kaspersky.com/pdf/Kaspersky-Lab-KSN-Report-mobile-cyberthreats-web.pdf.
    • (2014)
    • Kaspersky1
  • 7
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to Android
    • in: CCS’10
    • D. Barrera, H.G. Kayacik, P.C. van Oorschot, A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to Android, in: CCS’10, 2010, pp. 73–84. http://dx.doi.org/10.1145/1866307.1866317.
    • (2010) , pp. 73-84
    • Barrera, D.1    Kayacik, H.G.2    van Oorschot, P.C.3    Somayaji, A.4
  • 8
    • 84865024594 scopus 로고    scopus 로고
    • Android permissions: User attention, comprehension, and behavior
    • SOUPS’12
    • A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, D. Wagner, Android permissions: User attention, comprehension, and behavior, in: SOUPS’12, 2012. http://dx.doi.org/10.1145/2335356.2335360.
    • (2012)
    • Felt, A.P.1    Ha, E.2    Egelman, S.3    Haney, A.4    Chin, E.5    Wagner, D.6
  • 9
    • 84908058224 scopus 로고    scopus 로고
    • Exploring permission-induced risk in Android applications for malicious application detection
    • Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X., Exploring permission-induced risk in Android applications for malicious application detection. Trans. Inf. Forensics Secur. 9:11 (2014), 1869–1882, 10.1109/TIFS.2014.2353996.
    • (2014) Trans. Inf. Forensics Secur. , vol.9 , Issue.11 , pp. 1869-1882
    • Wang, W.1    Wang, X.2    Feng, D.3    Liu, J.4    Han, Z.5    Zhang, X.6
  • 11
    • 84869416020 scopus 로고    scopus 로고
    • CHEX: statically vetting Android apps for component hijacking vulnerabilities
    • CCS’12
    • L. Lu, Z. Li, Z. Wu, W. Lee, G. Jiang, CHEX: statically vetting Android apps for component hijacking vulnerabilities, in: CCS’12. http://dx.doi.org/10.1145/2382196.2382223.
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.5
  • 12
    • 84856225193 scopus 로고    scopus 로고
    • Andromaly: A behavioral malware detection framework for Android devices
    • Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y., Andromaly: A behavioral malware detection framework for Android devices. J. Intell. Inf. Syst. 38:1 (2012), 161–190, 10.1007/s10844-010-0148-x.
    • (2012) J. Intell. Inf. Syst. , vol.38 , Issue.1 , pp. 161-190
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3    Glezer, C.4    Weiss, Y.5
  • 13
    • 84869432690 scopus 로고    scopus 로고
    • Using probabilistic generative models for ranking risks of Android apps
    • CCS’12
    • H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, I. Molloy, Using probabilistic generative models for ranking risks of Android apps, in: CCS’12. http://dx.doi.org/10.1145/2382196.2382224.
    • Peng, H.1    Gates, C.2    Sarma, B.3    Li, N.4    Qi, Y.5    Potharaju, R.6    Nita-Rotaru, C.7    Molloy, I.8
  • 14
    • 84864033989 scopus 로고    scopus 로고
    • Android permissions: a perspective combining risks and benefits
    • SACMAT’12.
    • B.P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, I. Molloy, Android permissions: a perspective combining risks and benefits, in: SACMAT’12. http://dx.doi.org/10.1145/2295136.2295141.
    • Sarma, B.P.1    Li, N.2    Gates, C.3    Potharaju, R.4    Nita-Rotaru, C.5    Molloy, I.6
  • 15
    • 84869439259 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
    • NDSS’12.
    • Y. Zhou, W. Zhi, Z. Wu, X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets, in: NDSS’12.
    • Zhou, Y.1    Zhi, W.2    Wu, Z.3    Jiang, X.4
  • 16
    • 84889046959 scopus 로고    scopus 로고
    • Structural detection of Android malware using embedded call graphs
    • AISec’13.
    • H. Gascon, F. Yamaguchi, D. Arp, K. Rieck, Structural detection of Android malware using embedded call graphs, in: AISec’13. http://dx.doi.org/10.1145/2517312.2517315.
    • Gascon, H.1    Yamaguchi, F.2    Arp, D.3    Rieck, K.4
  • 17
    • 84910658019 scopus 로고    scopus 로고
    • Drebin: Effective and explainable detection of Android malware in your pocket
    • NDSS’14.
    • D. Arp, M. Spreitzenbarth, M. Hübner, H. Gascon, K. Rieck, Drebin: Effective and explainable detection of Android malware in your pocket, in: NDSS’14.
    • Arp, D.1    Spreitzenbarth, M.2    Hübner, M.3    Gascon, H.4    Rieck, K.5
  • 18
    • 84879543890 scopus 로고    scopus 로고
    • MAST: Triage for market-scale mobile malware analysis
    • WiSec’13.
    • S. Chakradeo, B. Reaves, P. Traynor, W. Enck, MAST: Triage for market-scale mobile malware analysis, in: WiSec’13. http://dx.doi.org/10.1145/2462096.2462100.
    • Chakradeo, S.1    Reaves, B.2    Traynor, P.3    Enck, W.4
  • 19
    • 79959456761 scopus 로고    scopus 로고
    • TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
    • OSDI’10.
    • W. Enck, P. Gilbert, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, A.N. Sheth, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, in: OSDI’10.
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 20
    • 84907029013 scopus 로고    scopus 로고
    • Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps
    • in: PLDI’14
    • S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, P. McDaniel, Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps, in: PLDI’14. http://dx.doi.org/10.1145/2594291.2594299.
    • Arzt, S.1    Rasthofer, S.2    Fritz, C.3    Bodden, E.4    Bartel, A.5    Klein, J.6    Le Traon, Y.7    Octeau, D.8    McDaniel, P.9
  • 21
    • 84878368035 scopus 로고    scopus 로고
    • Dissecting Android malware: Characterization and evolution
    • S&P’12
    • Y. Zhou, X. Jiang, Dissecting Android malware: Characterization and evolution, in: S&P’12. http://dx.doi.org/10.1109/SP.2012.16.
    • Zhou, Y.1    Jiang, X.2
  • 22
    • 84860679345 scopus 로고    scopus 로고
    • Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
    • WiSec’13
    • Z. Xu, K. Bai, S. Zhu, Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors, in: WiSec’13. http://dx.doi.org/10.1145/2185448.2185465.
    • Xu, Z.1    Bai, K.2    Zhu, S.3
  • 23
    • 84920790174 scopus 로고    scopus 로고
    • Gyrophone: Recognizing speech from gyroscope signals
    • SEC’14.
    • Y. Michalevsky, D. Boneh, G. Nakibly, Gyrophone: Recognizing speech from gyroscope signals, in: SEC’14.
    • Michalevsky, Y.1    Boneh, D.2    Nakibly, G.3
  • 24
    • 85025148063 scopus 로고    scopus 로고
    • Droidapiminer: Mining api-level features for robust malware detection in Android
    • Springer
    • Aafer, Y., Du, W., Yin, H., Droidapiminer: Mining api-level features for robust malware detection in Android. Security and Privacy in Communication Networks, 2013, Springer, 86–103, 10.1007/978-3-319-04283-1_6.
    • (2013) Security and Privacy in Communication Networks , pp. 86-103
    • Aafer, Y.1    Du, W.2    Yin, H.3
  • 25
    • 85019842706 scopus 로고    scopus 로고
    • < uses-feature >∣ Android Developers. URL.
    • < uses-feature >∣ Android Developers. URL http://developer.Android.com/guide/topics/manifest/uses-feature-element.html.
  • 26
    • 84869388345 scopus 로고    scopus 로고
    • PScout: analyzing the Android permission specification
    • CCS’12.
    • K.W.Y. Au, Y.F. Zhou, Z. Huang, D. Lie, PScout: analyzing the Android permission specification, in: CCS’12. http://dx.doi.org/10.1145/2382196.2382222.
    • Au, K.W.Y.1    Zhou, Y.F.2    Huang, Z.3    Lie, D.4
  • 28
    • 0003500248 scopus 로고
    • C4.5: Programs for Machine Learning
    • Morgan Kaufmann Publishers Inc. San Francisco, CA, USA
    • Quinlan, J.R., C4.5: Programs for Machine Learning. 1993, Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
    • (1993)
    • Quinlan, J.R.1
  • 29
    • 85019932977 scopus 로고    scopus 로고
    • Myapp market. URL.
    • Myapp market. URL http://Android.myapp.com/.
  • 30
    • 85019872456 scopus 로고    scopus 로고
    • Lenovomm market. URL.
    • Lenovomm market. URL http://www.lenovomm.com/.
  • 31
    • 85019921110 scopus 로고    scopus 로고
    • Gfan market. URL.
    • Gfan market. URL http://app.gfan.com/.
  • 32
    • 85019856867 scopus 로고    scopus 로고
    • Nduoa market. URL.
    • Nduoa market. URL http://nduoa.com/.
  • 33
    • 85019853456 scopus 로고    scopus 로고
    • VirusTotal - free online virus, malware and URL scanner. URL.
    • VirusTotal - free online virus, malware and URL scanner. URL https://www.virustotal.com/.
  • 34
    • 85019916788 scopus 로고    scopus 로고
    • VirusShare.com URL.
    • VirusShare.com URL http://virusshare.com/.
  • 35
    • 79955702502 scopus 로고    scopus 로고
    • LIBSVM: A library for support vector machines
    • http://dx.doi.org/10.1145/1961189.1961199 software available at URL.
    • Chang, C.-C., Lin, C.-J., LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol., 2, 2011 software available at URL http://www.csie.ntu.edu.tw/~cjlin/libsvm. http://dx.doi.org/10.1145/1961189.1961199.
    • (2011) ACM Trans. Intell. Syst. Technol. , vol.2
    • Chang, C.-C.1    Lin, C.-J.2
  • 37
    • 84885406698 scopus 로고    scopus 로고
    • Gnu parallel-the command-line power tool
    • Tange, O., Gnu parallel-the command-line power tool. USENIX Mag. 36:1 (2011), 42–47.
    • (2011) USENIX Mag. , vol.36 , Issue.1 , pp. 42-47
    • Tange, O.1
  • 38
    • 84868259476 scopus 로고    scopus 로고
    • Droidmat: Android malware detection through manifest and api calls tracing
    • Asia JCIS’12.
    • D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, K.-P. Wu, Droidmat: Android malware detection through manifest and api calls tracing, in: Asia JCIS’12. http://dx.doi.org/10.1109/AsiaJCIS.2012.18.
    • Wu, D.-J.1    Mao, C.-H.2    Wei, T.-E.3    Lee, H.-M.4    Wu, K.-P.5
  • 39
    • 70449372975 scopus 로고    scopus 로고
    • Effect of errors in ground truth on classification accuracy
    • Carlotto, M.J., Effect of errors in ground truth on classification accuracy. Int. J. Remote Sens. 30:18 (2009), 4831–4849.
    • (2009) Int. J. Remote Sens. , vol.30 , Issue.18 , pp. 4831-4849
    • Carlotto, M.J.1
  • 40
    • 84861302816 scopus 로고    scopus 로고
    • Is this app safe?: A large scale study on application permissions and risk signals
    • WWW’12.
    • P.H. Chia, Y. Yamamoto, N. Asokan, Is this app safe?: A large scale study on application permissions and risk signals, in: WWW’12. http://dx.doi.org/10.1145/2187836.2187879.
    • Chia, P.H.1    Yamamoto, Y.2    Asokan, N.3
  • 41
    • 84899029401 scopus 로고    scopus 로고
    • WHYPER: Towards automating risk assessment of mobile applications
    • SEC’13.
    • R. Pandita, X. Xiao, W. Yang, W. Enck, T. Xie, WHYPER: Towards automating risk assessment of mobile applications, in: SEC’13.
    • Pandita, R.1    Xiao, X.2    Yang, W.3    Enck, W.4    Xie, T.5
  • 42
    • 84993660403 scopus 로고    scopus 로고
    • Checking app behavior against app descriptions
    • ICSE’14.
    • A. Gorla, I. Tavecchia, F. Gross, A. Zeller, Checking app behavior against app descriptions, in: ICSE’14. http://dx.doi.org/10.1145/2568225.2568276.
    • Gorla, A.1    Tavecchia, I.2    Gross, F.3    Zeller, A.4
  • 43
    • 84874080269 scopus 로고    scopus 로고
    • Mining permission request patterns from Android and facebook applications
    • ICDM’12.
    • M. Frank, B. Dong, A.P. Felt, D. Song, Mining permission request patterns from Android and facebook applications, in: ICDM’12. http://dx.doi.org/10.1109/ICDM.2012.86.
    • Frank, M.1    Dong, B.2    Felt, A.P.3    Song, D.4
  • 44
    • 84897734703 scopus 로고    scopus 로고
    • Machine learning for Android malware detection using permission and API calls
    • ICTAI’13.
    • N. Peiravian, X. Zhu, Machine learning for Android malware detection using permission and API calls, in: ICTAI’13. http://dx.doi.org/10.1109/ICTAI.2013.53.
    • Peiravian, N.1    Zhu, X.2
  • 45
    • 84874835750 scopus 로고    scopus 로고
    • AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users
    • CODASPY’13.
    • S. Rosen, Z. Qian, Z.M. Mao, AppProfiler: A flexible method of exposing privacy-related behavior in Android applications to end users, in: CODASPY’13. http://dx.doi.org/10.1145/2435349.2435380.
    • Rosen, S.1    Qian, Z.2    Mao, Z.M.3
  • 46
    • 84961574697 scopus 로고    scopus 로고
    • Effectiveness of opcode ngrams for detection of multi family Android malware
    • Availability, Reliability and Security (ARES), 10th International Conference on, 2015, pp.
    • G. Canfora, A.D. Lorenzo, E. Medvet, F. Mercaldo, C.A. Visaggio, Effectiveness of opcode ngrams for detection of multi family Android malware, in: Availability, Reliability and Security (ARES), 2015 10th International Conference on, 2015, pp. 333–340. http://dx.doi.org/10.1109/ARES.2015.57.
    • (2015) , pp. 333-340
    • Canfora, G.1    Lorenzo, A.D.2    Medvet, E.3    Mercaldo, F.4    Visaggio, C.A.5
  • 47
    • 84888348488 scopus 로고    scopus 로고
    • Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families
    • Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Blasco, J., Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families. Expert Syst. Appl. 41:4 (2014), 1104–1117.
    • (2014) Expert Syst. Appl. , vol.41 , Issue.4 , pp. 1104-1117
    • Suarez-Tangil, G.1    Tapiador, J.E.2    Peris-Lopez, P.3    Blasco, J.4
  • 48
    • 84872224783 scopus 로고    scopus 로고
    • Madam: A multi-level anomaly detector for Android malware
    • Springer
    • Dini, G., Martinelli, F., Saracino, A., Sgandurra, D., Madam: A multi-level anomaly detector for Android malware. MMM-ACNS, Vol. 12, 2012, Springer, 240–253, 10.1007/978-3-642-33704-8_21.
    • (2012) MMM-ACNS, Vol. 12 , pp. 240-253
    • Dini, G.1    Martinelli, F.2    Saracino, A.3    Sgandurra, D.4
  • 49
    • 80755143401 scopus 로고    scopus 로고
    • Crowdroid: behavior-based malware detection system for Android
    • SPSM’11
    • I. Burguera, U. Zurutuza, S. Nadjm-Tehrani, Crowdroid: behavior-based malware detection system for Android, in: SPSM’11. http://dx.doi.org/10.1145/2046614.2046619.
    • Burguera, I.1    Zurutuza, U.2    Nadjm-Tehrani, S.3
  • 50
    • 84883095467 scopus 로고    scopus 로고
    • Networkprofiler: Towards automatic fingerprinting of Android apps
    • INFOCOM’13.
    • S. Dai, A. Tongaonkar, X. Wang, A. Nucci, D. Song, Networkprofiler: Towards automatic fingerprinting of Android apps, in: INFOCOM’13. http://dx.doi.org/10.1109/INFCOM.2013.6566868.
    • Dai, S.1    Tongaonkar, A.2    Wang, X.3    Nucci, A.4    Song, D.5
  • 51
    • 85019925991 scopus 로고    scopus 로고
    • Copperdroid: Automatic reconstruction of Android malware behaviors., in: NDSS
    • K. Tam, S.J. Khan, A. Fattori, L. Cavallaro, Copperdroid: Automatic reconstruction of Android malware behaviors., in: NDSS, 2015.
    • (2015)
    • Tam, K.1    Khan, S.J.2    Fattori, A.3    Cavallaro, L.4
  • 52
    • 85040734343 scopus 로고    scopus 로고
    • Madam: Effective and efficient behavior-based Android malware detection and prevention
    • 1–1
    • Saracino, A., Sgandurra, D., Dini, G., Martinelli, F., Madam: Effective and efficient behavior-based Android malware detection and prevention. IEEE Trans. Dependable Secure Comput., PP(99), 2016, 10.1109/TDSC.2016.2536605 1–1.
    • (2016) IEEE Trans. Dependable Secure Comput. , vol.PP , Issue.99
    • Saracino, A.1    Sgandurra, D.2    Dini, G.3    Martinelli, F.4
  • 53
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • CCS’09.
    • W. Enck, M. Ongtang, P. McDaniel, On lightweight mobile phone application certification, in: CCS’09. http://dx.doi.org/10.1145/1653662.1653691.
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 54
    • 77954487766 scopus 로고    scopus 로고
    • Apex: extending Android permission model and enforcement with user-defined runtime constraints
    • AsiaCCS’10.
    • M. Nauman, S. Khan, X. Zhang, Apex: extending Android permission model and enforcement with user-defined runtime constraints, in: AsiaCCS’10. http://dx.doi.org/10.1145/1755688.1755732.
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 55
    • 80755167433 scopus 로고    scopus 로고
    • Xmandroid: A new Android evolution to mitigate privilege escalation attacks, Technische Universität Darmstadt
    • Technical Report TR-2011-04.
    • S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, Xmandroid: A new Android evolution to mitigate privilege escalation attacks, Technische Universität Darmstadt, Technical Report TR-2011-04.
    • Bugiel, S.1    Davi, L.2    Dmitrienko, A.3    Fischer, T.4    Sadeghi, A.-R.5
  • 56
    • 84862082806 scopus 로고    scopus 로고
    • Semantically rich application-centric security in Android
    • Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P., Semantically rich application-centric security in Android. Secur. Commun. Netw. 5:6 (2012), 658–673, 10.1002/sec.360.
    • (2012) Secur. Commun. Netw. , vol.5 , Issue.6 , pp. 658-673
    • Ongtang, M.1    McLaughlin, S.2    Enck, W.3    McDaniel, P.4
  • 57
    • 85019872422 scopus 로고    scopus 로고
    • Security enhanced (se) Android: Bringing flexible mac to Android, in: NDSS’13
    • S. Smalley, R. Craig, Security enhanced (se) Android: Bringing flexible mac to Android, in: NDSS’13.
    • Smalley, S.1    Craig, R.2
  • 58
    • 84889041424 scopus 로고    scopus 로고
    • Appintent: Analyzing sensitive data transmission in Android for privacy leakage detection
    • CCS’13
    • Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, X.S. Wang, Appintent: Analyzing sensitive data transmission in Android for privacy leakage detection, in: CCS’13. http://dx.doi.org/10.1145/2508859.2516676.
    • Yang, Z.1    Yang, M.2    Zhang, Y.3    Gu, G.4    Ning, P.5    Wang, X.S.6
  • 60
    • 84910617173 scopus 로고    scopus 로고
    • Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps
    • in: CCS’14
    • F. Wei, S. Roy, X. Ou, et al. Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps, in: CCS’14. http://dx.doi.org/10.1145/2660267.2660357.
    • Wei, F.1    Roy, S.2    Ou, X.3
  • 61
    • 85015638536 scopus 로고    scopus 로고
    • Discovering and understanding Android sensor usage behaviors with data flow analysis
    • Liu, X., Liu, J., Wang, W., He, Y., Zhang, X., Discovering and understanding Android sensor usage behaviors with data flow analysis. World Wide Web, 2017, 1–22, 10.1007/s11280-017-0446-0.
    • (2017) World Wide Web , pp. 1-22
    • Liu, X.1    Liu, J.2    Wang, W.3    He, Y.4    Zhang, X.5
  • 63
    • 84901587738 scopus 로고    scopus 로고
    • A machine-learning approach for classifying and categorizing Android sources and sinks
    • NDSS’14
    • S. Rasthofer, S. Arzt, E. Bodden, A machine-learning approach for classifying and categorizing Android sources and sinks, in: NDSS’14.
    • Rasthofer, S.1    Arzt, S.2    Bodden, E.3
  • 64
    • 85015148814 scopus 로고    scopus 로고
    • Anomadroid: Profiling Android applications’ behaviors for identifying unknown malapps
    • 2016 IEEE Trustcom/BigDataSE/ISPA, pp.
    • D. Su, W. Wang, X. Wang, J. Liu, Anomadroid: Profiling Android applications’ behaviors for identifying unknown malapps, in: 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, pp. 691–698. http://dx.doi.org/10.1109/TrustCom.2016.0127.
    • (2016) , pp. 691-698
    • Su, D.1    Wang, W.2    Wang, X.3    Liu, J.4
  • 65
    • 85011337840 scopus 로고    scopus 로고
    • Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
    • Wang, W., Li, Y., Wang, X., Liu, J., Zhang, X., Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.01.019.
    • (2017) Future Gener. Comput. Syst.
    • Wang, W.1    Li, Y.2    Wang, X.3    Liu, J.4    Zhang, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.