참고문헌
- Daniel Arp, Michael Spreitzenbarth, Malte Huebner, Hugo Gascon, and Konrad Rieck. Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket, In 21th Annual Network and Distributed System Security Symposium (NDSS), February 2014
- Chen, J., Alalfi, M. H., Dean, T. R., and Zou, Y. Detecting Android Malware Using Clone Detection. Journal of Computer Science and Technology, 30(5), 942-956, 2015. https://doi.org/10.1007/s11390-015-1573-7
- K. Chen, P. Liu, and Y. Zhang. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. In International Conference on Software Engineering (ICSE), pages:175-186, 2014.
- Crussell, Jonathan, Clint Gibler, and Hao Chen. Scalable semantics-based detection of similar Android applications. In ESORICS 2013, Springer Berlin Heidelberg, 2013.
- Crussell, Jonathan, Clint Gibler, and Hao Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets. In ESORICS 2012, 2012
- Gonzalez, H., Stakhanova, N., and Ghorbani, A. A. DroidKin: lightweight detection of Android apps similarity. In International Conference on Security and Privacy in Communication Networks, pages:436-453, Springer International Publishing, September 2014.
- S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song. Juxtapp: a scalable system for detecting code reuse among Android applications. In DIMVA'12 Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2012.
- Jiao, S., Cheng, Y., Ying, L., Su, P., and Feng, D. A Rapid and Scalable Method for Android Application Repackaging Detection. Information Security Practice and Experience, pages:349-364, Springer International Publishing, 2015.
- Kim, D., Gokhale, A., Ganapathy, V., and Srivastava, A. Detecting plagiarized mobile apps using API birthmarks. Automated Software Engineering, pages:1-28, 2015.
- H. Shahriar and V. Clincy Kullback-Leibler Divergence Based Detection of Repackaged Android Malware. Journal of Information Security Research, Vol. 6, Num. 1, March 2015.
- Shao, Y., Luo, X., Qian, C., Zhu, P., and Zhang, L. Towards a scalable resource-driven approach for detecting repackaged Android applications. In Proceedings of the ACM Annual Computer Security Applications Conference, pages:56-65, December 2014.
- Soh, C., Tan, H. B. K., Arnatovich, Y. L., and Wang, L. Detecting clones in Android applications through analyzing user interfaces. In IEEE 23rd International Conference on Program Comprehension (ICPC), pages:163-173, May 2015.
- Sun, X., Zhongyang, Y., Xin, Z., Mao, B., and Xie, L. Detecting code reuse in Android applications using component-based control flow graph. In ICT Systems Security and Privacy Protection, pages:142-155, Springer Berlin Heidelberg, 2014.
- Sun, M., Li, M., and Lui, J. DroidEagle: seamless detection of visually similar Android apps. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, June 2015.
- A. Wald. Sequential Analysis. Dover, 2004.
- Wang, H., Guo, Y., Ma, Z., and Chen, X. WuKong: a scalable and accurate two-phase approach to Android app clone detection. In Proceedings of the 2015 International Symposium on Software Testing and Analysis, pages:71-82, July 2015.
- Zhang, F., Huang, H., Zhu, S., Wu, D., and Liu, P. ViewDroid: Towards obfuscation-resilient mobile application repackaging detection. In Proceedings of the ACM conference on Security and privacy in wireless & mobile networks, pages: 25-36, July 2014.
- Zhauniarovich, Y., Gadyatskaya, O., Crispo, B., La Spina, F., and Moser, E. FSquaDRA: fast detection of repackaged applications. In Data and Applications Security and Privacy XXVIII, pages:130-145, Springer Berlin Heidelberg, 2014.
- W. Zhou, X. Zhang, and X. Jiang. AppInk: watermarking Android apps for repackaging deterrence. In ASIA CCS, pages:1-12, May 2013.
- W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party Android marketplaces. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012.