[1] |
阿里聚安全[EB/OL]. . 2016.
|
|
Ali poly security[EB/OL]. . 2016.
|
[2] |
FOSSI M , EGAN G , HALEY K , et al. Symantec internet security threat report trends for 2010[R]. 2010.
|
[3] |
CONTI G , DEAN E , SINDA M , et al. Visual reverse engineering of binary and data files[J]. Journal of General Physiology, 2008,115 (5):637.
|
[4] |
ANDERSON B , STORLIE C , LANE T . Improving malware classi-fication:bridging the static/dynamic gap[C]// The 5th ACM Work-shop on Security and Artificial Intelligence.c 2012:3-14.
|
[5] |
NATARAJ L , YEGNESWARAN V , PORRAS P , et al. A compara-tive assessment of malware classification using binary texture analysis and dynamic analysis[C]// The 4th ACM Workshop on Se-curity and Artificial Intelligence.c 2011:21-30.
|
[6] |
NATARAJ L , KARTHIKEYAN S , JACOB G , et al. Malware im-ages:visualization and automatic classification[C]// The 8th Interna-tional Symposium on Visualization for Cyber Security,ACM.c 2011:4.
|
[7] |
WU Y , YAP R . Experiments with malware visualization[M]// De-tection of Intrusions and Malware,and Vulnerability Assessment. Berlin Heidelberg: Springer, 2012:123-133.
|
[8] |
HAN K , LIM J , IM E . Malware analysis method using visualization of binary files[C]// The 2013 Research in Adaptive and Convergent Systems,ACM.c 2013:317-321.
|
[9] |
SHAID M , ZAINUDEEN S , MAAROF M . Malware behavior image for malware variant identification[C]// 2014 International Symposium on Biometrics and Security Technologies (ISBAST),IEEE.c 2014:238-243.
|
[10] |
韩晓光, 曲武, 姚宣霞 , 等. 基于纹理指纹的恶意代码变种检测方法研究[J]. 通信学报, 2014,35(8):125-136.
|
|
HAN X G , QU W , YAO X X , et al. Malicious code variants detec-tion method based on texture fingerprint study[J]. Journal of Com-munications, 2014,35(8):125-136.
|
[11] |
ZHOU Y , JIANG X . Dissecting android malware:characterization and evolution[C]// 2012 IEEE Symposium on Security and Privacy (SP),IEEE.c 2012:95-109.
|
[12] |
ARP D , SPREITZENBARTH M , HUBNER M , et al. DREBIN:effective and explainable detection of android malware in your pocket[C]// Network and Distributed System Security Symposium (NDSS).c 2014.
|
[13] |
ELENKOV N . Android security internals:an in-depth guide to android's security architecture[M]. No Starch Press, 2014.
|
[14] |
OLIVA A , TORRALBA A . Modeling the shape of the scene:a holistic representation of the spatial envelope[J]. International Journal of Computer Vision, 2001,42 (3):145-175.
|
[15] |
T-SNE[EB/OL]. . 2016.
|
[16] |
HAN J , KAMBER M , PEI J , . Data mining[M] San Francisco: Morgan Kaufmann, 2011.
|
[17] |
The drebin dataset[EB/OL]. . 2016.
|