-
1
-
-
85025176022
-
-
ActivityManager
-
ActivityManager, http://developer.android.com/reference/android/app/ActivityManager.html
-
-
-
-
2
-
-
85025143492
-
-
Androguard
-
Androguard, http://code.google.com/p/androguard/
-
-
-
-
3
-
-
85025124196
-
-
Android Malware Genome Project, http://www.malgenomeproject.org/
-
-
-
-
4
-
-
85025131276
-
-
Intent
-
Intent, http://developer.android.com/reference/android/content/Intent.html
-
-
-
-
5
-
-
85025117322
-
-
Malware that Takes Without Asking
-
Malware that Takes Without Asking, http://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/documentation/white-paper/malware-that-takes-without-asking/
-
-
-
-
6
-
-
85025174717
-
-
Process
-
Process, http://developer.android.com/reference/android/os/Process.html
-
-
-
-
7
-
-
85025169886
-
-
RapidMiner
-
RapidMiner, http://rapid-i.com/content/view/181/190/
-
-
-
-
8
-
-
0025725905
-
Instance-Based Learning Algorithms
-
Aha, D.W., Kibler, D., Albert, M.K.: Instance-Based Learning Algorithms. Machine Learning 6, 37–66 (1991)
-
(1991)
Machine Learning
, vol.6
, pp. 37-66
-
-
Aha, D.W.1
Kibler, D.2
Albert, M.K.3
-
9
-
-
78651410113
-
An Android Application Sandbox System for Suspicious Software Detection
-
Blasing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S.A., Albayrak, S.: An Android Application Sandbox System for Suspicious Software Detection. In: MALWARE (2010)
-
(2010)
MALWARE
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.A.4
Albayrak, S.5
-
10
-
-
84870769313
-
Crowdroid: Behavior-Based Malware Detection System for Android
-
Burguera, I., Zurutuza, U., Nadijm-Tehrani, S.: Crowdroid: Behavior-Based Malware Detection System for Android. In: SPSM (2011)
-
(2011)
SPSM
-
-
Burguera, I.1
Zurutuza, U.2
Nadijm-Tehrani, S.3
-
11
-
-
79955570859
-
-
USENIX, OSDI
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: USENIX, OSDI (2011)
-
(2011)
Taintdroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
12
-
-
74049155830
-
On Lightweight Mobile Phone Application Certication
-
Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certication. In: CCS (2009)
-
(2009)
CCS
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
13
-
-
80755187788
-
Android Permissions De-mystied
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android Permissions De-mystied. In: CCS (2011)
-
(2011)
CCS
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
14
-
-
84942541638
-
-
USENIX, WebApps
-
Felt, A.P., Greenwood, K., Wagner, D.: The Effectiveness of Application Permissions. In: USENIX, WebApps (2011)
-
(2011)
The Effectiveness of Application Permissions
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
15
-
-
85165758676
-
-
NDSS
-
Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic Detection of Capability Leaks in Stock Android Smartphones. In: NDSS (2012)
-
(2012)
Systematic Detection of Capability Leaks in Stock Android Smartphones
-
-
Grace, M.1
Zhou, Y.2
Wang, Z.3
Jiang, X.4
-
16
-
-
84869416020
-
CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities
-
Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.I.: CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities. In: CCS (2012)
-
(2012)
CCS
-
-
Lu, L.1
Li, Z.2
Wu, Z.3
Lee, W.4
Jiang, G.I.5
-
17
-
-
84869432690
-
Using Probabilistic Generative Models for Ranking Risks of Android Apps
-
Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R.: Using Probabilistic Generative Models for Ranking Risks of Android Apps. In: CCS (2012)
-
(2012)
CCS
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
-
18
-
-
78751498804
-
Paranoid Android: Versatile Protection for Smartphones
-
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: Versatile Protection for Smartphones. In: ACSAC (2010)
-
(2010)
ACSAC
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
19
-
-
84863138661
-
Plagiarizing Smartphone Applications: Attack Strategies and Defense
-
Barthe, G., Livshits, B., Scandariato, R, Springer, Heidelberg
-
Potharaju, R., Newell, A., Nita-Rotaru, C., Zhang, X.: Plagiarizing Smartphone Applications: Attack Strategies and Defense. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 106–120. Springer, Heidelberg (2012)
-
(2012)
Essos 2012. LNCS
, vol.7159
, pp. 106-120
-
-
Potharaju, R.1
Newell, A.2
Nita-Rotaru, C.3
Zhang, X.4
-
20
-
-
33744584654
-
Induction of Decision Tree
-
Quinlan, J.R.: Induction of Decision Tree. Machine Learning 1(1), 81–106 (1986)
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
21
-
-
0005685575
-
C4.5: Programs for Machine Learning
-
Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann (1993)
-
(1993)
Morgan Kaufmann
-
-
Quinlan, J.R.1
-
22
-
-
84864033989
-
Android Permissions: A Perspective Combining Risks and Benets
-
Sarma, B., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android Permissions: A Perspective Combining Risks and Benets. In: SACMAT (2012)
-
(2012)
SACMAT
-
-
Sarma, B.1
Li, N.2
Gates, C.3
Potharaju, R.4
Nita-Rotaru, C.5
Molloy, I.6
-
23
-
-
70449482715
-
Static Analysis of Executables for Collaborative Malware Detection on Android
-
Schmidt, A.-D., Bye, R., Schmidt, H.-G., Clausen, J., Kiraz, O., Yuksel, K.A., Camtepe, S.A., Albayrak, S.: Static Analysis of Executables for Collaborative Malware Detection on Android. In: ICC (2009)
-
(2009)
ICC
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.4
Kiraz, O.5
Yuksel, K.A.6
Camtepe, S.A.7
Albayrak, S.8
-
24
-
-
84856225193
-
Andromaly: A Behavioral Malware Detection Framework for Android Devices
-
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a Behavioral Malware Detection Framework for Android Devices. Journal of Intelligent Information Systems Archive 38(1) (2012)
-
(2012)
Journal of Intelligent Information Systems Archive
, vol.38
, Issue.1
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
26
-
-
84872101378
-
Permission Evolution in the Android Ecosystem
-
Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Permission Evolution in the Android Ecosystem. In: ACSAC (2012)
-
(2012)
ACSAC
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
28
-
-
85137132511
-
Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In: CODASPY (2012)
-
(2012)
CODASPY
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
29
-
-
84869439259
-
-
NDSS
-
Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In: NDSS (2012)
-
(2012)
Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|