|
[1] D. Arp, M. Spretzenbarth, M. Hubner, H. Gascon and K. Rieck, “DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket,” in Proceedings of Network and Distributed System Security Symposium, Feb. 2014.
[2] A. Bacci, A. Bartoli, F. Martinelli, E. Medvet, F. Mercaldo and C. A. Visaggio “Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis,” in Proceedings of Information Systems Security and Privacy, 4th International Conference, January 2018.
[3] I. Burguera, U. Zurutuza and S. Nadjm-Tehrani “Crowdroid: Behavior-based Malware Detection System for Android,” in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp. 15-26, Chicago, Illinois, USA, October 2011.
[4] L. Chen, M. Zhang, C. Y. Yang and R. Sahita “POSTER: Semi-supervised Classification for Dynamic Android Malware Detection,” in Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.2479-2481, Dallas, Texas, USA, October 2017.
[5] W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” in Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 393-407, Canada, October 2010.
[6] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A Survey of Mobile Malware in the Wild,” in Proceedings of 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3-14, Chicago, USA, October 2011.
[7] S. Liang and X. Du, “Permission-combination-based Scheme for Android Mobile Malware Detection,” 2014 IEEE International Conference on Communications (ICC), pp.2301-2306, 2014.
[8] L. Lu, Z. Li, Z. Wu, W. Lee and G. Jiang, “CHEX: Statically Vetting Android apps for Component Hijacking Vulnerabilities,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 229-240, USA, October 2012.
[9] S. H. Seo, A. Gupta, A. M. Sallam, E. Bertino and K. Yim, “Detecting Mobile Malware Threats to Homeland Security Through Static Analysis,” Journal of Network and Computer Applications,vol.38, pp. 43-53, Feb. 2014.
[10] P. R. Varma, K. P. Raj and K. V. Raju “Android Mobile Security by Detecting and Classification of Malware based on Permissions using Machine Learning Algorithms,” in Proceedings of 2017 IEEE International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), India, 05 October 2017.
[11] L. Xu, D. Zhang, N. Jayasena and J. Cavazos, “HADM: Hybrid Analysis for Detection of Malware,” in Proceedings of SAI Intelligent Systems Conference 2016, pp. 702-724, 2016.
[12] L. K. Yan and H. Yin, “DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis,” USENIX Security 12, pp. 569-584 Bellevue, WA, USENIX, 2012.
[13] H. Yin, D. Song, M. Egele, C. Kruegel and E. Kirda “Panorama:Capturing System-wide Information Flow for Malware Detection and Analysis,” in Proceedings of ACM on Computer and Communications Security , 2007.
[14] Y. Zhou and X. Jiang “Detecting Passive Content Leaks and Pollution in Android Applications,” in Proceedings of the 20th Network and Distributed System Security Symposium, San Diego, USA, February 2013.
[15] Android ANT, https://developer.android.com/studio/build/building-cmdline.html
[16] Android Market wiki, https://code.google.com/archive/p/androidbmi/wikis/AndroidMarket.wiki
[17] Android Monkey, https://developer.android.com/studio/test/monkey.html
[18] ANT, http://ant.apache.org/
[19] jarsigner, https://docs.oracle.com/javase/7/docs/technotes/tools/windows/jarsigner.html
[20] Malware Sample Sources for Researchers (August, 2017), https://zeltser.com/malware-sample-sources/
[21] Requesting Permissions at Run Time, https://developer.android.com/training/permissions/requesting.html
[22] Robotium, https://github.com/robotiumtech/robotium
[23] Scikit-learn (September, 2017), http://scikit-learn.org/stable/
[24] Smartphone OS Market Share, Q1 2017. http://www.idc.com/promo/smartphone-market-share/os
[25] zipalign, https://developer.android.com/studio/command-line/zipalign.html
|