메뉴 건너뛰기




Volumn 127 LNICST, Issue , 2013, Pages 86-103

DroidAPIMiner: Mining API-level features for robust malware detection in android

Author keywords

Android; Classification; Malware; Static detection

Indexed keywords

ANDROID (OPERATING SYSTEM); CLASSIFICATION (OF INFORMATION); MALWARE;

EID: 85025148063     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-04283-1_6     Document Type: Conference Paper
Times cited : (616)

References (29)
  • 1
    • 85025176022 scopus 로고    scopus 로고
    • ActivityManager
    • ActivityManager, http://developer.android.com/reference/android/app/ActivityManager.html
  • 2
    • 85025143492 scopus 로고    scopus 로고
    • Androguard
    • Androguard, http://code.google.com/p/androguard/
  • 3
    • 85025124196 scopus 로고    scopus 로고
    • Android Malware Genome Project, http://www.malgenomeproject.org/
  • 4
    • 85025131276 scopus 로고    scopus 로고
    • Intent
    • Intent, http://developer.android.com/reference/android/content/Intent.html
  • 5
    • 85025117322 scopus 로고    scopus 로고
    • Malware that Takes Without Asking
    • Malware that Takes Without Asking, http://labs.mwrinfosecurity.com/tools/2012/03/16/mercury/documentation/white-paper/malware-that-takes-without-asking/
  • 6
    • 85025174717 scopus 로고    scopus 로고
    • Process
    • Process, http://developer.android.com/reference/android/os/Process.html
  • 7
    • 85025169886 scopus 로고    scopus 로고
    • RapidMiner
    • RapidMiner, http://rapid-i.com/content/view/181/190/
  • 10
    • 84870769313 scopus 로고    scopus 로고
    • Crowdroid: Behavior-Based Malware Detection System for Android
    • Burguera, I., Zurutuza, U., Nadijm-Tehrani, S.: Crowdroid: Behavior-Based Malware Detection System for Android. In: SPSM (2011)
    • (2011) SPSM
    • Burguera, I.1    Zurutuza, U.2    Nadijm-Tehrani, S.3
  • 12
    • 74049155830 scopus 로고    scopus 로고
    • On Lightweight Mobile Phone Application Certication
    • Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certication. In: CCS (2009)
    • (2009) CCS
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 16
    • 84869416020 scopus 로고    scopus 로고
    • CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities
    • Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.I.: CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities. In: CCS (2012)
    • (2012) CCS
    • Lu, L.1    Li, Z.2    Wu, Z.3    Lee, W.4    Jiang, G.I.5
  • 17
    • 84869432690 scopus 로고    scopus 로고
    • Using Probabilistic Generative Models for Ranking Risks of Android Apps
    • Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R.: Using Probabilistic Generative Models for Ranking Risks of Android Apps. In: CCS (2012)
    • (2012) CCS
    • Peng, H.1    Gates, C.2    Sarma, B.3    Li, N.4    Qi, Y.5    Potharaju, R.6
  • 19
    • 84863138661 scopus 로고    scopus 로고
    • Plagiarizing Smartphone Applications: Attack Strategies and Defense
    • Barthe, G., Livshits, B., Scandariato, R, Springer, Heidelberg
    • Potharaju, R., Newell, A., Nita-Rotaru, C., Zhang, X.: Plagiarizing Smartphone Applications: Attack Strategies and Defense. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 106–120. Springer, Heidelberg (2012)
    • (2012) Essos 2012. LNCS , vol.7159 , pp. 106-120
    • Potharaju, R.1    Newell, A.2    Nita-Rotaru, C.3    Zhang, X.4
  • 20
    • 33744584654 scopus 로고
    • Induction of Decision Tree
    • Quinlan, J.R.: Induction of Decision Tree. Machine Learning 1(1), 81–106 (1986)
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.R.1
  • 21
    • 0005685575 scopus 로고
    • C4.5: Programs for Machine Learning
    • Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann (1993)
    • (1993) Morgan Kaufmann
    • Quinlan, J.R.1
  • 26
  • 28
    • 85137132511 scopus 로고    scopus 로고
    • Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
    • Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In: CODASPY (2012)
    • (2012) CODASPY
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.