[1] |
上年国内在网活跃移动智能设备数量达到 8.99 亿[EB/OL].[2016-04-25]. .The number of online active smart devices reach 0.899 billion in first half of 2015 in China[EB/OL].[2016-04-25]. .
|
[2] |
GRACE M , ZHOU Y , ZHANG Q ,et al. RiskRanker:scalable and accurate zero-day Android malware detection[C]// The 10th International Conference on Mobile Systems,Applications and Services(MobiSys 2012),April 5-11,2012, San Diego,CA,USA. New York: ACM Press, 2012: 281-294.
|
[3] |
ARP D , SPREITZENBARTH M , HUBNER M ,et al. Drebin:effective and explainable detection of Android malware in your pocket[C]// Network and Distributed System Security Symposium(NDSS 2014),June 11-15,2014, San Diego,CA,USA. Washington: IEEE Computer Society, 2014: 199-210.
|
[4] |
Linear SVM[EB/OL].[2016-04-25]. .
|
[5] |
HAO S , LIU B , NATH S ,et al. Programmable UI-automation for large-scale dynamic analysis of mobile apps[C]// 12th International Conference on Mobile Systems,Applications and Services(MobiSys 2014),September 5-11,2014, Bretton Woods,New Hampshire,USA. New York: ACM Press, 2014: 204-217.
|
[6] |
ENCK W , GILBERT P , CHUN B ,et al. Taintdroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C]// 9th USENIX Conference on Operating Systems Design and Implementation,December 9-12,2010, Vancouver,BC,Canada. New Jersey: IEEE Press, 2010: 1-6.
|
[7] |
Monkey[EB/OL].[2016-04-25]. .
|
[8] |
WEI X , GOMEZ L , NEAMTIU I ,et al. Profile droid:multilayer profilin g of android applications[C]// 18th Annual International Conference on Mobile Computing and Networking(MobiCom 2012),June 11-15,2012, Istanbul,Turkey. New York: ACM Press, 2012: 137-148.
|
[9] |
JIANG X , ZHOU Y . Dissecting android malware:Characterization and evolution[C]// 2012 IEEE Symposium on Security and Privacy,May 20-23,2012, San Francisco,USA. New Jersey: IEEE Press, 2012: 95-109.
|
[10] |
SU X , ZHANG D , DAI S ,et al. Mobile traffic Identification based on applications network signature[J]. International Journal of Embedded Systems, 2016,8(2-3): 217-227.
|
[11] |
DAI S , TONGAONKAR A , WANG X ,et al. Network profiler:Towards automatic fingerprinting of android apps[C]// 32nd IEEE International Conference on Computer Communications,Infocom 2013,June 5-7,2013, Turin,Italy. New Jersey: IEEE Press, 2013: 809-817.
|
[12] |
XU Q , LIAO Y , MISKOVIC S ,et al. Automatic generation of mobile App signatures from traffic observations[C]// 34th IEEE International Conference on Computer Communications,Infocom 2015,November 3-5,2015, Hong Kong,China. New Jersey: IEEE Press, 2015: 1481-1489.
|
[13] |
ZHOU Y , JIANG X . Dissecting android malware:characterization and evolution[C]// IEEE Symposium on Security and Privacy,June 5-9,2012, San Francisco,CA,USA. New Jersey: IEEE Press, 2012: 95-109.
|
[14] |
Tcpdump[EB/OL].[2016-04-25]. .
|
[15] |
Tools[EB/OL].[2016-04-25]. .
|
[16] |
Jaccard index[EB/OL].[2016-04-25]. .
|
[17] |
Adrd[EB/OL].[2016-04-25]. .
|
[18] |
Trojan:droid dream light[EB/OL].(2011-07-23)[2016-04-25]. .
|
[19] |
Alexa[EB/OL].[2016-04-25]. .
|
[20] |
GRACE M , ZHOU W , JIANG X ,et al. Unsafe exposure analysis of mobile in-app advertisements[C]// Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec 2012),November 3-5,2012, Tucson,Arizona,USA. New York: ACM Press, 2012: 101-112.
|
[21] |
苏欣, 张大方, 罗章琪 ,等. 基于Command and Control通信信道流量属性聚类的僵尸网络检测方法[J]. 电子与信息学报, 2012,34(8): 1993-1999. SU X , ZHANG D F , LUO Z Q ,et al. Botnet detecting method based on clustering flow attributes of Command and Control communication channel[J]. Journal of Electronics & Information Technology, 2012,34(8): 1993-1999.
|
[22] |
Virus total[EB/OL].[2016-04-25]. .
|