|
[1] https://blog.vpn.asia/fight-ransomware/ [2] http://www.bloomberg.com/news/articles/2016-01-21/google-s-android-generates-31-billion-revenue-oracle-says-ijor8hvt [3] http://dedexer.sourceforge.net/. [4] Zhang, Yudong, and Lenan Wu, (2011), Optimal multi-level thresholding based on maximum Tsallis entropy via an artificial bee colony approach, Entropy, Vol. 13, No 4, pp 841-859. [5] Y.. Da-zhang, Z. Jian-gang, and G. Yong, "A way of graying in the image of a bitmap and the realization of programming", Journal of Guangxi University of Technology, vol. 15, no. 1, pp. 23-26, 2004 [6] https://www.google.com/admob/ [7] https://en.wikipedia.org/wiki/AdMob [8] https://en.wikipedia.org/wiki/Advertising network [9] https://www.virustotal.com/zh-tw/ [10] https://www.virustotal.com/en/documentation/public-api/ [11] https://blog.lookout.com/blog/2015/11/04/trojanized-adware/ [12] "AdDroid: privilege separation for applications and advertisers in Android" ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David Wagner. [13] L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. 2012. CHEX: Statically vetting Android apps for component hijacking vulnerabilities. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS'12). 229–240. [14] http://www.idc.com/prodserv/smartphone-os-market-share.jsp [15] "Android phones hit by Ransomware," http://bits.blogs.nytimes.com/ 2014/08/22/android-phones-hit-by-ransomware/?r=0. [16] https://blog.malwarebytes.com/threat-analysis/2016/01/when-url-shorteners-and-ransomware-collide/ [17] Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.NDSS 21-24 February 2016, San Diego, CA, USA Copyright 2016 Internet Society, ISBN 1-891562-41-X [18] John Canny. A computational approach to edge detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, PAMI-8(6):679–698, Nov. 1986 [19] M. Grace, W. Zhou, X. Jiang, and A. Sadeghi,"Unsafe exposure analysis of mobile in-app advertise-ments,"in WiSec, 2012 [20] P. Pearce, A. P. Felt, and D. Wagner. AdDroid: Privilege separation for applications and advertisers in Android. In 7th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'12), Seoul, Korea, May 2012 [21] Laboratory for Communications and Applications(2011). IEEE COMSOC MMTC E-Letter: ISPs and Ad Networks against Botnet Ad Fraud. http://infoscience.epfl.ch/record/165675/files/E-Letter-Vraton-jic.pdf (Access Date: 30 January, 2012). [22] Emre Erturk, Eastern Institute of Technology. A Case Study in Open Source Software Security and Privacy: Android Adware, 2012 IEEE. [23] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. 2012. Towards taming privilege escalation attacks on Android. In Proceedings of the 19th Network and Distributed System Security Symposium(NDSS’12). [24] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. 2011a. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks. Technical Report TR-2011-04. Technische Universitt Darmstadt, Darmstadt, Germany. [25] A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. 2011c. Permission re-delegation: Attacks and defenses. In Proceedings of the 20th USENIX Security Symposium. 331–346. [26] E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. 2011. Analyzing inter-application communication in Android. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys'11). 239–252 [27] P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. Singh Gaur, M. Conti and M. Rajarajan, Android Security: A Survey of Issues, Malware Penetration and Defenses, in: IEEE, 2015, pp. 1–17. [28] Open Handest Alliance: Industry Leaders Announce Open Platform for Mobile Devices. Press release. http://www.openhandsetalliance.com/press 110507.html [29] Open Handest Alliance: Open Handset Alliance Releases Android SDK. Press release. http://www.openhandsetalliance.com/press 111207.html [30] Open Handest Alliance: Open Handest Alliance website. http://www.openhandsetalliance.com [31] Google Inc.: Android Open Source Project. http://source.android.com. [32] A. Narayanan, L. Chen, and C. K. Chan. AdDetect: Automated detection of Android ad libraries using semantic analysis. In Proceedings of IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP’14), 2014. [33] Li Li, Tegawend’e F. Bissyand’e, Jacques Klein, and Yves Le Traon. An Investigation into the Use of Common Libraries in Android Apps. In Technique Report, 2015. [34] https://developer.android.com/guide/components/intents-filters.html [35] https://developer.android.com/reference/android/content/Intent.html [36] https://play.google.com/store [37] E. Erturk, "A case study in open source software security and privacy: Android adware", WorldCIS 2012, pp. 189-191. [38] http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-what-it-is-and-how-you-can-protect-yourself [39] Benjamin Speckmann, "The Android mobile platform", A Review Paper Submitted to Eastern Michigan University on 16th April , 2008. [40] Kilgo, P.M., (n.d.). Android OS: A robust, free, open-source operating system for mobile devices. Retrieved October 1, 2009, from http://pk-fire.com/etc/wtf/Android-os-final.pdf. [41] A. Zarras, A. Kapravelos, G. Stringhini, T. Holz, C. Kruegel, and G. Vigna, "The dark alleys of madison avenue: Understanding malicious advertisements," in Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 2014, pp. 373–380. [42] Z. Li, K. Zhang, Y. Xie, F. Yu, and X. Wang, "Knowing your enemy: understanding and detecting malicious web advertising," in Proceedings of the 2012 ACM conference on Computer and Communications Security. ACM, 2012, pp. 674–686. [43] [T. Berners-Lee,1994] T. Berners-Lee.Uniform Resource Locators—A unifying syntax for the expression of names and addresses of objects on the network.(1 Jan. 1994) expires 1 July ,1994. [44] W. Enck. 2011. Defending users against smartphone apps: Techniques and future directions. In Proceedings of the 7th International Conference on Information Systems Security (ICISS’11). 49–70. [45] https://developer.android.com/reference/android/content/Intent.html [46] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A study of android application security", in USENIX Security, 2011. [47] Y. Zhang, D. Song, H. Xue, and T. Wei, "Ad vulna: A vulnaggressive (vulnerable & aggressive) adware threatening millions," 2013, https://www.fireeye.com/blog/threat-research/2013/10/ad-vulna-a-vulnaggressive-vulnerable-aggressive-adware-threatening-millions. html. [48] S. Shekhar, M. Dietz, and D. S. Wallach,"Adsplit: Separating smartphone advertising from applications."in USENIX Security Symposium, 2012, pp.553–567. [49] M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock Android smartphones. In Proceedings of the NDSS, 2012 [50] R. Wang, L. Xing, X. Wang, and S. Chen. Unauthorized origin crossing on mobile platforms: Threats and mitigation. In Proceedings of the 2013 ACM CCS, 2013. [51] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In Proceedings of the NDSS, 2012.
|