메뉴 건너뛰기




Volumn , Issue , 2015, Pages

CopperDroid: Automatic Reconstruction of Android Malware Behaviors

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID (OPERATING SYSTEM); COMMERCE; LIFE CYCLE; SEMANTICS;

EID: 85063002231     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23145     Document Type: Conference Paper
Times cited : (348)

References (49)
  • 2
    • 84873821798 scopus 로고    scopus 로고
    • Android
    • Android, “Android developer reference, ” http://developer.android.com/reference/packages.html.
    • Android developer reference
  • 3
    • 84883120881 scopus 로고    scopus 로고
    • Android
    • Android, “Monkeyrunner, ” http://developer.android.com/tools/help/monkeyrunner_concepts.html.
    • Monkeyrunner
  • 6
    • 85063636742 scopus 로고    scopus 로고
    • QEMU, a fast and portable dynamic translator
    • F. Bellard, “QEMU, a fast and portable dynamic translator, ” in Proc. of USENIX ATC, 2005.
    • (2005) Proc. of USENIX ATC
    • Bellard, F.1
  • 7
    • 77957939810 scopus 로고    scopus 로고
    • Dalvik VM internals
    • D. Bornstein, “Dalvik VM internals, ” in Google I/O, 2008.
    • (2008) Google I/O
    • Bornstein, D.1
  • 9
    • 67650790221 scopus 로고    scopus 로고
    • Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • C. Cadar, D. Dunbar, and D. R. Engler, “Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, ” in OSDI, 2008.
    • (2008) OSDI
    • Cadar, C.1    Dunbar, D.2    Engler, D. R.3
  • 10
    • 70349141059 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • L. Cavallaro, P. Saxena, and R. Sekar, “On the limits of information flow techniques for malware analysis and containment, ” in DIMVA, 2008.
    • (2008) DIMVA
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 13
    • 85180555201 scopus 로고    scopus 로고
    • A. Developers, “Parcelable, ” http://developer.android.com/reference/android/os/Parcelable.html.
    • Parcelable
    • Developers, A.1
  • 14
    • 79955570859 scopus 로고    scopus 로고
    • Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth, “Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones, ” in USENIX OSDI, 2010.
    • (2010) USENIX OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.3    Cox, L.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 16
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone application certification, ” in ACM CCS, 2009.
    • (2009) ACM CCS
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 17
    • 60049085302 scopus 로고    scopus 로고
    • Understanding android security
    • Jan. [Online]. Available
    • W. Enck, M. Ongtang, and P. McDaniel, “Understanding android security, ” IEEE Security and Privacy, vol. 7, no. 1, pp. 50-57, Jan. 2009. [Online]. Available: http://dx.doi.org/10.1109/MSP.2009.26
    • (2009) IEEE Security and Privacy , vol.7 , Issue.1 , pp. 50-57
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 20
    • 85080362568 scopus 로고    scopus 로고
    • A Virtual Machine Introspection Based Architecture for Intrusion Detection
    • T. Garfinkel and M. Rosenblum, “A Virtual Machine Introspection Based Architecture for Intrusion Detection, ” in Proc. of NDSS, 2003.
    • (2003) Proc. of NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 21
    • 84958626651 scopus 로고    scopus 로고
    • Pup-petdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications
    • abs/1402.4826
    • A. Gianazza, F. Maggi, A. Fattori, L. Cavallaro, and S. Zanero, “Pup-petdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications, ” CoRR, vol. abs/1402.4826, 2014.
    • (2014) CoRR
    • Gianazza, A.1    Maggi, F.2    Fattori, A.3    Cavallaro, L.4    Zanero, S.5
  • 22
    • 84888999727 scopus 로고    scopus 로고
    • Juxtapp: A scalable system for detecting code reuse among android applications
    • S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song, “Juxtapp: A scalable system for detecting code reuse among android applications, ” in Proc. of DIMVA, 2012.
    • (2012) Proc. of DIMVA
    • Hanna, S.1    Huang, L.2    Wu, E.3    Li, S.4    Chen, C.5    Song, D.6
  • 24
    • 85180546689 scopus 로고    scopus 로고
    • Iseclab
    • Iseclab, “Anubis, ” http://anubis.iseclab.org.
    • Anubis
  • 29
    • 85092858716 scopus 로고    scopus 로고
    • H. Lockheimer, “Bouncer, ” http://googlemobile.blogspot.it/2012/02/android-and-security.html.
    • Bouncer
    • Lockheimer, H.1
  • 30
    • 85180550280 scopus 로고    scopus 로고
    • McAfee, “Mcafee, ” http://www.mcafee.com.
    • Mcafee
  • 32
    • 84868107162 scopus 로고    scopus 로고
    • Dissecting the Android's Bouncer
    • J. Oberheide and C. Miller, “Dissecting the Android's Bouncer, ” Sum-merCon, 2012, http://jon.oberheide.org/files/summercon12-bouncer.pdf.
    • (2012) Sum-merCon
    • Oberheide, J.1    Miller, C.2
  • 37
    • 84887633886 scopus 로고    scopus 로고
    • On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
    • Jul
    • G. Sarwar, O. Mehani, R. Boreli, and M. A. Kaafar, “On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices, ” in SECRYPT, Jul. 2013.
    • (2013) SECRYPT
    • Sarwar, G.1    Mehani, O.2    Boreli, R.3    Kaafar, M. A.4
  • 38
    • 70349160649 scopus 로고    scopus 로고
    • Pointless tainting?: evaluating the practicality of pointer tainting
    • W. Schröder-Preikschat, J. Wilkes, and R. Isaacs, Eds. ACM
    • A. Slowinska and H. Bos, “Pointless tainting?: evaluating the practicality of pointer tainting, ” in EuroSys, W. Schröder-Preikschat, J. Wilkes, and R. Isaacs, Eds. ACM, 2009, pp. 61-74.
    • (2009) EuroSys , pp. 61-74
    • Slowinska, A.1    Bos, H.2
  • 40
    • 85180545804 scopus 로고    scopus 로고
    • The Honeynet Project, “Droidbox, ” https://code.google.com/p/droidbox/.
    • Droidbox
  • 41
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • C. Willems, T. Holz, and F. Freiling, “Toward automated dynamic malware analysis using cwsandbox, ” IEEE S&P, 2007.
    • (2007) IEEE S&P
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 42
    • 85047887956 scopus 로고    scopus 로고
    • Aurasium: Practical policy enforcement for android applications
    • R. Xu, H. Saıdi, and R. Anderson, “Aurasium: Practical policy enforcement for android applications, ” in Proc. of USENIX Security, 2012.
    • (2012) Proc. of USENIX Security
    • Xu, R.1    Saıdi, H.2    Anderson, R.3
  • 43
    • 85060493868 scopus 로고    scopus 로고
    • DroidScope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis
    • L.-K. Yan and H. Yin, “DroidScope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, ” in Proc. of USENIX Security, 2012.
    • (2012) Proc. of USENIX Security
    • Yan, L.-K.1    Yin, H.2
  • 45
    • 84995413501 scopus 로고    scopus 로고
    • SmartDroid: an automatic system for revealing UI-based trigger conditions in Android applications
    • C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou, “SmartDroid: an automatic system for revealing UI-based trigger conditions in Android applications, ” in Proc. of SPSM, 2012.
    • (2012) Proc. of SPSM
    • Zheng, C.1    Zhu, S.2    Dai, S.3    Gu, G.4    Gong, X.5    Han, X.6    Zou, W.7
  • 46
    • 85137132511 scopus 로고    scopus 로고
    • Detecting repackaged smartphone applications in third-party android marketplaces
    • W. Zhou, Y. Zhou, X. Jiang, and P. Ning, “Detecting repackaged smartphone applications in third-party android marketplaces, ” in Proc. of CODASPY, 2012.
    • (2012) Proc. of CODASPY
    • Zhou, W.1    Zhou, Y.2    Jiang, X.3    Ning, P.4
  • 48
    • 84869439259 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, ” in Proc. of NDSS, 2012.
    • (2012) Proc. of NDSS
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.