|
[1] Zhou, Yajin, and Xuxian Jiang. "Dissecting android malware: Characterization and evolution." Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012. [2] Shin, Wook, Kwak, S., Kiyomoto, S., Fukushima, K., and Tanaka, T. "A small but non-negligible flaw in the Android permission scheme." Policies for Distributed Systems and Networks (POLICY), 2010 IEEE International Symposium on. IEEE, 2010. [3] Isohara, Takamasa, Keisuke Takemori, and Ayumu Kubota. "Kernel-based behavior analysis for android malware detection." Computational Intelligence and Security (CIS), 2011 Seventh International Conference on. IEEE, 2011. [4] Apvrille, Axelle, and Tim Strazzere. "Reducing the Window of Opportunity for Android Malware Gotta catch’em all." Journal in Computer Virology 8.1-2 (2012): 61-71. [5] Schmidt, A-D.,Bye, R., Schmidt, H. G., Clausen, J., Kiraz, O., Yuksel, K. A, and Albayrak, S. "Static analysis of executables for collaborative malware detection on android." Communications, 2009. ICC'09. IEEE International Conference on. IEEE, 2009. [6] Cesare, Silvio, and Yang Xiang. "Classification of malware using structured control flow." Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing-Volume 107. Australian Computer Society, Inc., 2010. [7] Shin, Wook, Kiyomoto, S., Fukushima, K., and Tanaka, T. "A formal model to analyze the permission authorization and enforcement in the android framework." Social Computing (SocialCom), 2010 IEEE Second International Conference on. IEEE, 2010. [8] Tang, Wei, Jin, G., He, J., and Jiang, X. "Extending Android security enforcement with a security distance model." Internet Technology and Applications (iTAP), 2011 International Conference on. IEEE, 2011. [9] Delac, Goran, Marin Silic, and JakovKrolo. "Emerging security threats for mobile platforms." MIPRO, 2011 Proceedings of the 34th International Convention. IEEE, 2011. [10] Aswini, A. M., and P. Vinod. "Droid permission miner: Mining prominent permissions for Android malware analysis." Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on the. IEEE, 2014. [11] CA Chang, (2014, January).A Static API Analysis and Installation Advisory System for Android Applications. [12] Sanz, Borja,Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P. G., and #westeur002#lvarez, G. "Puma: Permission usage to detect malware in android." International Joint Conference CISIS’12-ICEUTE´ 12-SOCO´ 12 Special Sessions. Springer Berlin Heidelberg, 2013. [13] ZHANG Rui, YANG Jiyun. Android malware detection based on permission correlation. Journal of Computer Applications, 2014. [14] Felt, Adrienne Porter,Chin, E., Hanna, S., Song, D., and Wagner, D. "Android permissions demystified." Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011. [15] Rassameero j, Ittipon, and Yuzuru Tanahashi. "Various approaches in analyzing Android applications with its permission-based security models."Electro/Information Technology (EIT), 2011 IEEE International Conference on. IEEE, 2011. [16] Gascon, Hugo, Yamaguchi, F., Arp, D., and Rieck, K. "Structural detection of android malware using embedded call graphs." Proceedings of the 2013 ACM workshop on Artificial intelligence and security. ACM, 2013. [17] Roesner, Franziska, Kohno, T., Moshchuk, A., Parno, B., Wang, H. J., and Cowan, C. "User-driven access control: Rethinking permission granting in modern operating systems." Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012. [18] Nauman, Mohammad, Sohail Khan, and Xinwen Zhang. "Apex: extending android permission model and enforcement with user-defined runtime constraints." Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010. [19] JG,Song (2013). Covert Channel Based Malware Analysis and Detection for Android Systems. [20] Bonfante, Guillaume, Matthieu Kaczmarek, and Jean-Yves Marion. "Control flow graphs as malware signatures." International Workshop on the Theory of Computer Viruses. 2007. [21] Wang, Rui, Feng, D. G., Yang, Y., and Su, P. R. "Semantics-based malware behavior signature extraction and detection method." Ruanjian Xuebao/Journal of Software 23.2 (2012): 378-393. [22] Smith, Ryan W., and Adam Pridgen. "STAAF: Scaling Android Application Analysis with a Modular Framework." System Science (HICSS), 2012 45th Hawaii International Conference on. IEEE, 2012. [23] Blasing, Thomas,Batyuk, L., Schmidt, A. D., Camtepe, S. A., andAlbayrak, S. "An android application sandbox system for suspicious software detection." Malicious and unwanted software (MALWARE), 2010 5th international conference on. IEEE, 2010. [24] Reina, Alessandro, Aristide Fattori, and Lorenzo Cavallaro. "A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors." EuroSec, April (2013). [25] YZ,Shen (2013). Improving the Effectiveness of Automatic Dynamic Android Malware Analysis. [26] Parkour, Milla. "Contagio Mobile. Mobile malware mini dump." (2013). [27] Wen-Shou Tung, Po-Han Chen, Chao-Chun Huang, and Chun-Ying Huang, (2013). An Android Malware Signature Generator Based on Control Flow Graphs, 2013 Cryptology and Information Security Conference. [28] Felt, Adrienne Porter, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. "Android permissions: User attention, comprehension, and behavior." Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2012.
|