1 |
Jiang X . Dissecting Android malware: characterization and evolution. Proceedings of 2012 IEEE Symp on Security and Privacy, Francisco,California, 2012:95~109
|
2 |
Erturk E . Two trends in mobile malware: financial motives and transitioning from static to dynamic analysis. International Journal of Intelligent Computing Research(IJICR), 2012,3(3/4):325~329
|
3 |
Venugopal D . An efficient signature representation and matching method for mobile devices. Proceedings of 2nd Annual International Workshop on Wireless Internet(WICON'06), Boston,MA,United States, 2006
|
4 |
Zhou W , Zhou Y J . Detection of repackaged smartphone applications on Android. Proceedings of the Second ACM Conference on Data and Application Security and Privacy, San Antonio,USA, 2012:317~326
|
5 |
Zheng M . DroidAnalytics: a signature based analytic system to collect, extract, analyze and associate Android malware. , 2013
|
6 |
Elish K O . A static assurance analysis of Android applications. , 2013
|
7 |
Grace M . RiskRanker: scalable and accurate zero-day Android malware detection. Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Paphos, Cyprus, 2012:281~294
|
8 |
Enck W , Octeau D , McDaniel P , et al. A study of Android application security. Proceedings of the 20th USENIX Security Symposium, USENIX Security'11, San Francisco, CA, 2011
|
9 |
Zhao M . RobotDroid: a lightweight malware detection framework on smartphones. Journal of Networks, 2012,7(4):715~722
|
10 |
Zhao M . A smartphone malware detection framework based on artificial immunology. Journal of Networks, 2013,8(2):469~476
|
11 |
Shabtai A . Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 2012,38(1):161~190
|
12 |
Aung Z . Permission-based Android malware detection. National Journal of Science & Technology Research, 2013,2(3)
|
13 |
Burguera I . An Android application sandbox system for suspicious software detection. Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Berlin, Germany, 2011:15~26
|
14 |
Iland D . Detecting Android malware on network level. , 2011
|
15 |
Park Y . An Android security extension to protect personal information against illegal accesses and privilege escalation attacks. Journal of Internet Services and Information Security (JISIS), 2012,2(3/4):29~42
|
16 |
Beginners guide to Android reverse engineering. , 2012
|
17 |
Zhou Y , Wang Z , Zhou W , et al. Hey, you, get off my market:detecting malicious apps in alternative Android markets. Proceedings of the 16th Network and Distributed System Security Symposium, NDSS'12, San Diego, California, 2012
|
18 |
Su X . Smartphone dual defense protection framework: detecting malicious applications in Android markets. Proceedings of 8th International Conference on Mobile Ad Hoc and Sensor Networks, Chengdu, China, 2012
|
19 |
粟栗, 从健, 赵乐意 . 涉黄域名二次中标问题研究. 电信工程技术与标准化, 2011(10):11~14.
|