|
[1] 手機之家. http://imobile.com.cn/. [2] Androguard. https://code.google.com/p/androguard/. [3] Android Malware ITU Regional Forum on Cybersecurity. https://www.itu.int/ ITU-D/eur/rf/cybersecurity/presentations/symantec-itu_mobile.pdf. [4] Android rooting. https://en.wikipedia.org/wiki/Android_rooting. [5] APK Downloader. http://apps.evozi.com/apk-downloader/. [6] Bayesian network. https://en.wikipedia.org/wiki/Bayesian_network. [7] Contagio mobile. http://contagiominidump.blogspot.tw/. [8] Logistic regression. https://en.wikipedia.org/wiki/Logistic_regression# Bayesian_logistic_regression. [9] Strace for Android. http://benno.id.au/android/strace. [10] UI/Application Exerciser Monkey. https://developer.android.com/tools/help/ monkey.html. [11] VirusTotal - Free Online Virus, Malware and URL Scanner. https://www.virustotal. com/. [12] XDA Developer Forum. http://forum.xda-developers.com/. [13] Yousra Aafer, Wenliang Du, and Heng Yin. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. In Tanveer Zia, Albert Y. Zomaya, Vijay Varadharajan, and Zhuoqing Morley Mao, editors, SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 86–103. Springer, 2013. [14] Kevin Joshua Abela, Don Kristopher Angeles, Jan Raynier Delas Alas, Robert Joseph To- lentino, and Miguel Alberto Gomez. An Automated Malware Detection System for An- droid using Behavior-based Analysis AMDA. In International Journal of Cyber-Security and Digital Forensics, pages 1–11, 2013. [15] D. Aha and D. Kibler. Instance-based learning algorithms. Machine Learning, 6:37–66, 1991. [16] Zarni Aung and Win Zaw. Permission-Based Android Malware Detection. In Interna- tional Journal of Scientific &; Technology Research, pages 228–234, 2013. [17] AV-Comparatives. Mobile Security Review August 2013. Technical report, AV- Comparatives, 2013. [18] AV-Comparatives. File Detection Test March 2014. Technical report, AV-Comparatives, 2014. [19] Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. Crowdroid: Behavior-based Malware Detection System for Android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’11, pages 15–26, New York, NY, USA, 2011. ACM. [20] Chih-Chung Chang and Chih-Jen Lin. LIBSVM - A Library for Support Vector Machines, 2001. The Weka classifier works with version 2.82 of LIBSVM. [21] Blue Coat. Blue Coat Systems 2014 Mobile Malware Report. Technical report, Blue Coat, 2014. [22] Corinna Cortes and Vladimir Vapnik. Support-Vector Networks. Mach. Learn., 20(3):273–297, September 1995. [23] Gianluca Dini, Fabio Martinelli, Andrea Saracino, and Daniele Sgandurra. MADAM: A Multi-level Anomaly Detector for Android Malware. In Proceedings of the 6th Inter- national Conference on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security, MMM-ACNS’12, pages 240–253, Berlin, Heidelberg, 2012. Springer-Verlag. [24] Yasser EL-Manzalawy. WLSVM, 2005. You don’t need to include the WLSVM package in the CLASSPATH. [25] F-Secure. Mobile Threat Report Q1 2014. Technical report, F-Secure, 2014. [26] Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ’11, pages 627–638, New York, NY, USA, 2011. ACM. [27] Eibe Frank and Ian H. Witten. Generating Accurate Rule Sets Without Global Optimiza- tion. In J. Shavlik, editor, Fifteenth International Conference on Machine Learning, pages 144–151. Morgan Kaufmann, 1998. [28] Yoav Freund and Robert E. Schapire. A Decision-Theoretic Generalization of on-Line Learning and an Application to Boosting, 1997. [29] Jerome Friedman, Trevor Hastie, and Robert Tibshirani. Additive Logistic Regression: a Statistical View of Boosting. Annals of Statistics, 28:2000, 1998. [30] Joao Gama. Functional Trees. 55(3):219–250, 2004. [31] Alexander Genkin, David D. Lewis, and David Madigan. Large-scale bayesian logistic regression for text categorization. Technical report, DIMACS, 2004. [32] Sheran Gunasekera. Android Apps Security. Apress, Berkely, CA, USA, 1st edition, 2012. [33] Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. The WEKA Data Mining Software: An Update. SIGKDD Explor. Newsl., 11(1):10–18, November 2009. [34] You Joung Ham, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim, , and Jeong Nyeo Kim. Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack. In International Journal of Security and Its Applications, pages 231– 246, 2014. [35] Andrew Hoog. Android Forensics Investigation, Analysis, and Mobile Security for Google Android. Elsevier, 2011. [36] Chun-Ying Huang, Yi-Ting Tsai, and Chung-Han Hsu. Performance Evaluation on Permission-Based Detection for Android Malware. In Proceedings of International Computer Symposium (ICS), pages –, 2012. [37] Takamasa Isohara, Keisuke Takemori, and Ayumu Kubota. Kernel-based Behavior Analysis for Android Malware Detection. In Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security, CIS ’11, pages 1011–1015, Washington, DC, USA, 2011. IEEE Computer Society. [38] George H. John and Pat Langley. Estimating Continuous Distributions in Bayesian Classifiers. In Eleventh Conference on Uncertainty in Artificial Intelligence, pages 338–345, San Mateo, 1995. Morgan Kaufmann. [39] Ryan Johnson, ZhaohuiWang, Corey Gagnon, and Angelos Stavrou. Analysis of Android Applications’ Permissions. In SERE (Companion), pages 45–46. IEEE, 2012. [40] S. Kullback and R. A. Leibler. On Information and Sufficiency. Ann. Math. Statist., 22(1):79–86, 1951. [41] Kaspersky Lab. Kaspersky Security Bulletin 2013. Technical report, Kaspersky Lab, 2013. [42] McAfee Labs. McAfee Labs Threats Report: Fourth Quarter 2013. Technical report, McAfee Labs, 2013. [43] Niels Landwehr, Mark Hall, and Eibe Frank. Logistic model trees. 95(1-2):161–205, 2005. [44] Lookout. Mobile Threats, Made to Measure. Technical report, Lookout, 2013. [45] Steve Mansfield-Devine. Android malware and mitigations. Network Security, 2012(11):12–20, 2012. [46] Andreas Moser, Christopher Kruegel, and Engin Kirda. Limits of static analysis for malware detection. In ACSAC, pages 421–430. IEEE Computer Society, 2007. [47] Ross Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Mateo, CA, 1993. [48] Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. Droidchameleon: Evaluating android anti-malware against transformation attacks. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS ’13, pages 329–334, New York, NY, USA, 2013. ACM. [49] Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, and Gonzalo Álvarez Marañón. PUMA: Permission Usage to Detect Malware in Android. In CISIS/ICEUTE/SOCO Special Sessions, pages 289–298, 2012. [50] Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, and Pablo Garcia Bringas. Anomaly Detection Using String Analysis for Android Malware Detection. In SOCO-CISIS-ICEUTE, pages 469–478, 2013. [51] Sophos. Security Threat Report 2014. Technical report, Sophos, 2014. [52] Marc Sumner, Eibe Frank, and Mark Hall. Speeding up Logistic Model Tree Induction. In 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, pages 675–683. Springer, 2005. [53] Symantec. Mobile Adware and Malware Analysis. Technical report, Symantec, 2013. [54] F. Tchakounté and P. Dayang. System Calls Analysis of Malwares on Android. In International Journal of Science and Technology, pages 669–674, 2013. [55] Ian H. Witten, Eibe Frank, and Mark A. Hall. Data Mining: Practical Machine Learning Tools and Techniques, Third Edition. Elsevier, 2011. [56] Mike Wolfson. Android Developer Tools Essentials. O’Reilly Media, 2013. [57] Xindong Wu, Vipin Kumar, J. Ross Quinlan, Joydeep Ghosh, Qiang Yang, Hiroshi Motoda, Geoffrey J. McLachlan, Angus Ng, Bing Liu, Philip S. Yu, Zhi-Hua Zhou, Michael Steinbach, David J. Hand, and Dan Steinberg. Top 10 Algorithms in Data Mining. Knowl. Inf. Syst., 14(1):1–37, December 2007. [58] Min Zhao, Tao Zhang, Fangbin Ge, and Zhijian Yuan. RobotDroid: A Lightweight Malware Detection Framework On Smartphones. JNW, 7(4):715–722, 2012. [59] Yajin Zhou and Xuxian Jiang. Dissecting Android Malware: Characterization and Evolution. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP ’12, pages 95–109, Washington, DC, USA, 2012. IEEE Computer Society. [60] Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, and Zhong Chen. Permission-based Abnormal Application Detection for Android. In Proceedings of the 14th International Conference on Information and Communications Security, ICICS’12, pages 228–239, Berlin, Heidelberg, 2012. Springer-Verlag.
|