|
1.Zhou, Y., Jiang, X.: Dissecting Android Malware: Characterization and Evolution. In: IEEE Symposium on Security and Privacy, pp. 95–109. San Francisco, CA (2012) 2.William Enck, Peter Gilbert., et al.: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: 9th USENIX Symposium on Operating Systems Design and Implementation (2010) 3.Kimberly Tam, Salahuddin J. Khan., et al.: CopperDroid: Automatic Reconstruction of Android Malware Behaviors. In: The 2015 Network and Distributed System Security Symposium (NDSS 2015) 4.Victor van der Veen: Dynamic Analysis for Android Malware, VU University Amsterdam Faculty of Sciences Department of Computer Sciences (2013) 5.AU, K.W.Y., et al.: Pscout: Analyzing the Android Permission Specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217–228. ACM (2012) 6.Yan, L.-K., Yin, H.: DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In: USENIX Security Symposium, pp. 569–584. USENIX (2012) 7.Mu Zhang, Yue Duan, et al.: Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1105-1116. ACM (2014) 8.ANDERSON LUIZ SARTOR: AndroProf: A Profiling tool for the Android platform. In: IEEE Computing Systems Engineering (SBESC), pp. 23-28. IEEE (2013) 9.Cong Zheng, Shixiong Zhu, et al.: SmartDroid: An Automatic System for Revealing UI-based Trigger Conditions in Android Applications. In: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, pp. 93–104. ACM (2012) 10.Wei, X., et al.: ProfileDroid: Multi-layer Profiling of Android Applications. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, pp. 137–148. ACM (2012) 11.Yousra Aafer, Wenliang Du, et al.: DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. In: 9th International Conference on Security and Privacy in Communication Networks, (2013) 12.姜立垣: Malware family motif API sequence analysis on Windows platform (2016) 13.Oscar Somarriba, Urko Zurutuza, et al.: Detection and Visualization of Android Malware Behavior. In: Journal of Electrical and Computer Engineering. (2016) 14.Parvez Faruki, Vijay Laxmi, et al.: AndroSimilar: Robust signature for detecting variants of Android malware. In: journal of information security and applications. (2014) 15.Wei Yang, Xusheng Xiao et al.: AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. In: Proc. of 37th International Conference on Software Engineering. (2015) 16.Wenjun Hu, Jing Tao et. al.: MIGDroid: Detecting APP-Repackaging Android Malware via Method Invocation Graph. In: IEEE (2014) 17.Lukas Weichselbaum, Matthias Neugschwandtner et al.: ANDRUBIS: Android Malware Under The Magnifying Glass. In: iseclab (2015) 18.Seung-Hyun Seo, Aditi Gupta et al.: Detecting mobile malware threats to homeland security through static analysis. In: Journal of Network and Computer Applications. (2014) 19.Vaibhav Rastogi, Yan Chen., et al.: Appsplayground: Automatic Security Analysis of Smartphone Applications. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, pp. 209–220. ACM (2013) 20.Wu, D.-J., Mao, C.-H., et al.: Droidmat: Android Malware Detection Through Manifest and API Calls Tracing. In: 2012 IEEE Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62–69. IEEE (2012) 21.Android-x86 - Porting Android to x86, http://www.android-x86.org 22.QEMU Machine Protocol, http://wiki.qemu.org/QMP 23.Android Debug Bridge, http://developer.android.com/tools/help/adb.html 24. Android Developer Website, https://developer.android.com/index.html
|