[1] |
SORONCHO M F M , CHERUIYOT W , KIMANI S . Framework for vetting and identifying emulated Android mobile apps[J]. International Journal of Computer (IJC), 2016,23(1): 35-41.
|
[2] |
陈宏伟, 熊焰, 黄文超 ,等. 基于关联分析的 Android 权限滥用攻击检测系统[J]. 计算机系统应用, 2016,25(4): 36-42.
|
|
CHEN H W , XIONG Y , HUANG W C ,et al. Association analysis based detection system for Android permission abuse attacks[J]. Computer Systems & Applications, 2016,25(4): 36-42.
|
[3] |
BOWMAN-AMUAH M K . System,method and article of manufacture for security management in a development architecture framework:U.S.Patent 6,324,647[P]. 2001-11-27
|
[4] |
TAYLOR V F , MARTINOVIC I . To update or not to update:insights from a two-year study of Android app evolution[C]// The 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017: 45-57.
|
[5] |
杨欢, 张玉清, 胡予濮 ,等. 基于多类特征的Android应用恶意行为检测系统[J]. 计算机学报, 2014,37(01): 15-27.
|
|
YANG H , ZHANG Y Q , HU Y P ,et al. A malware behavior detection system of android application based on multi-class features[J]. Chinese Journal of Computers, 2014,37(01): 15-27.
|
[6] |
SUI A F , GUO D F , GUO T ,et al. Network behavior based mobile virus detection[C]// IEEE,International Conference on Communication Technology. 2012: 872-876.
|
[7] |
KIM J , YI K ,et al. SCANDal:static analyzer for detecting privacy leaks in Android applications[J]. Mobile Security Technologies, 2012,12.
|
[8] |
LU L , LI Z , WU Z ,et al. CHEX:statically vetting Android apps for component hijacking vulnerabilities[C]// The 2012 ACM Conference on Computer and Communications Security. ACM, 2012: 229-240.
|
[9] |
FUCHS A P , CHAUDHURI A , FOSTER J S . Scandroid:automated security certification of Android[R]. 2009.
|
[10] |
SHABTAI A , KANONOV U , ELOVICI Y ,et al. “Andromaly”:a behavioral malware detection framework for Android devices[J]. Journal of Intelligent Information Systems, 2012,38(1): 161-190.
|
[11] |
BURGUERA I , ZURUTUZA U , NADJM-TEHRANI S . Crowdroid:behavior based malware detection system for Android[C]// The 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 2011: 15-26.
|
[12] |
DINI G , MARTINELLI F , SARACINO A ,et al. MADAM:a multi-level anomaly detector for Android malware[C]// International Conference on Mathematical Methods,Models,and Architectures for Computer Network Security. Springer Berlin Heidelberg, 2012: 240-253.
|
[13] |
MAO C H , JENG A B , Lee H M ,et al. Android malware detection via a latent network behavior analysis[C]// IEEE,International Conference on Trust,Security and Privacy in Computing and Communications. IEEE, 2012: 1251-1258.
|
[14] |
卿斯汉, 蒋建春, 马恒太 ,等. 入侵检测技术研究综述[J]. 通信学报, 2004,25(7): 19-29.
|
|
QING S H , JIANG J C , MA H T ,et al. Research on intrusion detection techniques:a survey[J]. Journal on Communications, 2004,25(7): 19-29.
|
[15] |
KRüGEL C , TOTH T , KIRDA E . Service specific anomaly detection for network intrusion detection[C]// The 2002 ACM Symposium on Applied Computing. ACM, 2002: 201-208
|
[16] |
ZHOU Y , JIANG X . Dissecting Android malware:characterization and evolution[C]// Security and Privacy (SP),2012 IEEE Symposium on. IEEE, 2012: 95-109.
|
[17] |
ALAZAB M , MOONSAMY V , BATTEN L ,et al. Analysis of malicious and benign Android applications[C]// Distributed Computing Systems Workshops (ICDCSW),32nd International Conference on IEEE, 2012: 608-616.
|
[18] |
CHIN E , FELT A P , GREENWOOD K ,et al. Analyzing inter-application communication in Android[C]// International Conference on Mobile Systems,Applications,and Services. ACM, 2011: 239-252.
|
[19] |
BURGUERA I , ZURUTUZA U,NADJM-TEHRANI S . Crowdroid:behavior-based malware detection system for Android[C]// ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 2011: 15-26.
|
[20] |
李舟军, 吴春明, 王啸 . 基于沙盒的 Android 应用风险行为的分析与评估[J]. 清华大学学报, 2016,56(5): 453-460.
|
|
LI Z J , WU C M , WANG X . Assessment of Android application's risk behavior based on a sandbox system[J]. Journal of Tsinghua University (Science and Technology), 2016,56(5): 453-460.
|
[21] |
BL?SING T , BATYUK L , SCHMIDT A D ,et al. An Android application sandbox system for suspicious software detection[C]// International Conference on Malicious and Unwanted Software. IEEE, 2010: 55-62.
|
[22] |
JANG J , YUN J , MOHAISEN A ,et al. Detecting and classifying method based on similarity matching of Android malware behavior with profile[J]. SpringerPlus, 2016,5(1).
|