-
1
-
-
85178287263
-
Drebin: Effective and explainable detection of android malware in your pocket
-
Arp, D., Gascon, H., Rieck, K., Spreitzenbarth, M., Hübner, M. : DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In: Network and Distributed System Security Symposium. NDSS (2014)
-
(2014)
Network and Distributed System Security Symposium. NDSS
-
-
Arp, D.1
Gascon, H.2
Rieck, K.3
Spreitzenbarth, M.4
Hübner, M.5
-
2
-
-
84907029013
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., McDaniel, P. : Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Notices, 49 (6), 259-269 (2014)
-
(2014)
ACM SIGPLAN Notices
, vol.49
, Issue.6
, pp. 259-269
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
McDaniel, P.7
-
3
-
-
84951865145
-
Mining apps for abnormal usage of sensitive data
-
IEEE
-
Avdiienko, V., Kuznetsov, K., Gorla, A., Zeller, A., Arzt, S., Rasthofer, S., Bodden, E. : Mining apps for abnormal usage of sensitive data. In: 37th IEEE International Conference on Software Engineering, pp. 426-436. IEEE (2015)
-
(2015)
37th IEEE International Conference on Software Engineering
, pp. 426-436
-
-
Avdiienko, V.1
Kuznetsov, K.2
Gorla, A.3
Zeller, A.4
Arzt, S.5
Rasthofer, S.6
Bodden, E.7
-
6
-
-
85020448738
-
-
Deep Learning, https: //en. wikipedia. org/wiki/Deep-learning
-
Deep Learning
-
-
-
7
-
-
84904095463
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., Sheth, A. N. : TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32 (2), (2014)
-
(2014)
ACM Transactions on Computer Systems (TOCS)
, vol.32
, Issue.2
-
-
Enck, W.1
Gilbert, P.2
Han, S.3
Tendulkar, V.4
Chun, B.G.5
Cox, L.P.6
Sheth, A.N.7
-
9
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
ACM
-
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D. : These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 639-652. ACM (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
10
-
-
84930630277
-
Deep learning
-
LeCun, Y., Bengio, Y., Hinton, G. : Deep learning. Nature, 521 (7553), 436-444 (2015)
-
(2015)
Nature
, vol.521
, Issue.7553
, pp. 436-444
-
-
LeCun, Y.1
Bengio, Y.2
Hinton, G.3
-
11
-
-
84952979147
-
Evaluation of machine learning classifiers for mobile malware detection
-
Narudin, F. A., Feizollah, A., Anuar, N. B., Gani, A. : Evaluation of machine learning classifiers for mobile malware detection. Soft Computing, 20 (1), 343-357 (2016)
-
(2016)
Soft Computing
, vol.20
, Issue.1
, pp. 343-357
-
-
Narudin, F.A.1
Feizollah, A.2
Anuar, N.B.3
Gani, A.4
-
13
-
-
0029180939
-
Precise interprocedural dataflow analysis via graph reachability
-
ACM
-
Reps, T., Horwitz, S., Sagiv, M. : Precise interprocedural dataflow analysis via graph reachability. In: Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 49-61. ACM (1995)
-
(1995)
Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 49-61
-
-
Reps, T.1
Horwitz, S.2
Sagiv, M.3
-
14
-
-
84868087373
-
Puma: Permission usage to detect malware in android
-
Springer, Berlin Heidelberg
-
Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P. G., Álvarez, G. : Puma: Permission usage to detect malware in android. In: International Joint Conference CISIS'12-ICEUTÉ12-SOCO12 Special Sessions, pp. 289-298. Springer, Berlin Heidelberg (2013)
-
(2013)
International Joint Conference CISIS'12-ICEUTÉ12-SOCO12 Special Sessions
, pp. 289-298
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Bringas, P.G.5
Álvarez, G.6
-
15
-
-
85030534628
-
-
Sensor Tower, https: //sensortower. com
-
Sensor Tower
-
-
-
16
-
-
84856225193
-
Andromaly": A behavioral malware detection framework for android devices
-
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y. : "Andromaly": A behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 38 (1), 161-190 (2012)
-
(2012)
Journal of Intelligent Information Systems
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
17
-
-
85042866641
-
-
VirusShare, http: //virusshare. com/
-
VirusShare
-
-
-
18
-
-
84910617173
-
Amandroid: A precise and general intercomponent data flow analysis framework for security vetting of android apps
-
ACM
-
Wei, F., Roy, S., & Ou, X. : Amandroid: A precise and general intercomponent data flow analysis framework for security vetting of android apps. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1329-1341. ACM (2014)
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1329-1341
-
-
Wei, F.1
Roy, S.2
Ou, X.3
-
19
-
-
84868259476
-
Droidmat: Android malware detection through manifest and api calls tracing
-
IEEE
-
Wu, D. J., Mao, C. H., Wei, T. E., Lee, H. M., Wu, K. P. : Droidmat: Android malware detection through manifest and api calls tracing. In: Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62-69. IEEE (2012)
-
(2012)
Seventh Asia Joint Conference on Information Security (Asia JCIS)
, pp. 62-69
-
-
Wu, D.J.1
Mao, C.H.2
Wei, T.E.3
Lee, H.M.4
Wu, K.P.5
-
20
-
-
84958531554
-
Droiddetector: Android malware characterization and detection using deep learning
-
Yuan, Z., Lu, Y., Xue, Y. : Droiddetector: Android malware characterization and detection using deep learning. Tsinghua Science and Technology, 21 (1), 114-123 (2016)
-
(2016)
Tsinghua Science and Technology
, vol.21
, Issue.1
, pp. 114-123
-
-
Yuan, Z.1
Lu, Y.2
Xue, Y.3
-
21
-
-
84878368035
-
Dissecting android malware: Characterization and evolution
-
IEEE
-
Zhou, Y., Jiang, X. : Dissecting android malware: Characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95-109. IEEE (2012)
-
(2012)
2012 IEEE Symposium on Security and Privacy
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
|