References
- IDC: Smartphone OS Market share 2015,http://www.idc.com/prodserv/smartphone-os-market-share.jsp
- 360: mobile phone security situation report 2014, http://www.199it.com/archives/325900.html
- Wei X, Gomez L, Neamtiu I. and Faloutsos M., "Permission evolution in the Android ecosystem," in Proc. of Computer Security Applications Conference, 31-40, 2012.
- Au K W Y, Zhou Y F, Huang Z, Lie D., "PScout: analyzing the Android permission specification," in Proc. of the 2012 ACM conference on Computer and communications security. ACM, 217-228, 2012.
- Barrera D, Kayacik, H. G, Van Oorschot P C and Somayaji A., "A methodology for empirical analysis of permission-based security models and its application to android," in Proc. of ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October. 73-84, 2010.
- Johnson R, Wang Z, Gagnon C and Stavrou, "A. Analysis of Android Applications' Permissions," in Proc. of IEEE Sixth International Conference on Software Security and Reliability Companion. 45-46, 2012.
- Felt A P, Chin E, Hanna S, Song D and Wagner D., "Android permissions demystified," in Proc. of ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October. 627-638, 2011.
- Nauman M, Khan S, Zhang X., "Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints," in Proc. of ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April. 328-332, 2010.
- Ongtang M, Mclaughlin S, Enck W and McDaniel P., "Semantically Rich Application-Centric Security in Android," Security & Communication Networks, 5(6):658-673, 2009. https://doi.org/10.1002/sec.360
- Felt A P, Wang H J, Moshchuk A, Hanna S and Chin E., "Permission re-delegation: attacks and defenses," Usenix Conference on Security. USENIX Association, 22-22, 2011.
- Dietz M, Shekhar S, Pisetsky Y, Shu AandWallach DS., "Quire: lightweight provenance for smart phone operating systems," Dissertations & Theses, 23-23, 2011.
- Bugiel S, Davi L, Dmitrienko A, Fischer T and Sadeghi AR., "XManAndroid: A new Android evolution to mitigate privilege escalation attacks," Technical Report, Technische Universitat Darmstadt, TR-2011-04, 2011.
- Conti M, Nguyen V T N, Crispo B., "CRePE: Context-Related Policy Enforcement for Android," in Proc. of Information Security, International Conference, ISC 2010, Boca Raton, Fl, Usa, October 25-28, 2010, Revised Selected Papers. 331-345, 2010.
- Zhou Y, Zhang X, Jiang X and Freeh W V., "Taming Information-Stealing Smartphone Applications (on Android)," in Proc. of Trust and Trustworthy Computing International Conference, Trust 2011, Pittsburgh, Pa, Usa, June 22-24, 2011. Proceedings. 93-107, 2011.
- Sakamoto S, Okuda K, Nakatsuka R and Yamauchi T., "DroidTrack: tracking and visualizing information diffusion for preventing information leakage on Android," Journal of Internet Services and Information Security (JISIS) 4.2, 55-69, 2014. https://doi.org/10.22667/JISIS.2014.05.31.055
- Nauman M, Khan S, Zhang X and Seifert JP, "Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform," in Proc. of Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010.
- Song F, Touili T., "Model-Checking for Android Malware Detection," Programming Languages and Systems. Springer International Publishing, 216-235, 2014.
- Reina A, Fattori A, Cavallaro L., "A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors," Eurosec, 2014.
- Zhang Y, Yang M, Xu B, Yang Z and Gu G., "Vetting undesirable behaviors in android apps with permission use analysis," Computer and Communications Security, 9:611-622, 2013.
- Lindorfer M, Neugschwandtner M, Weichselbaum L and Fratantonio Y, "ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors," in Proc. of Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, IEEE Computer Society, 3-17, 2014.
- Enck W, Gilbert P, Chun B-G, McDaniel P, Sheth A., "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," ACM Transactions on Computer Systems, 32(2):393-407, 2014.
- Droidbox, http:code.google.com/p/droidbox.
- Yan, Lok-Kwong, and Heng Yin, "DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis," USENIX security symposium. 2012.
- Rastogi V, Chen Y, Enck W., "AppsPlayground: automatic security analysis of smartphone applications," in Proc. of ACM Conference on Data and Application Security and Privacy. 209-220, 2013.
- Sun, Mingshen, J. C. S. Lui and X. Jiang, "Design and implementation of an Android host-based intrusion prevention system," in Proc. of the 30th Annual Computer Security Applications Conference. ACM, pp.226-235, 2014.
- Blasing T, Batyuk L, Schmidt A D, Camtepe SA., "An Android Application Sandbox system for suspicious software detection," in Proc. of International Conference on Malicious and Unwanted Software. IEEE, S166, 2010.
- Enck W, Ongtang M and Mcdaniel P, "On lightweight mobile phone application certification," Computer and Communications Security, 2009.
- Liang, Shuang, and Xiaojiang Du, "Permission-combination-based scheme for Android mobile malware detection," in Proc. of the 2014 IEEE International Conference on Communications, Sidney, Australia, pp. 2301-2306, June 2014.
- Zhou, W., Zhou, Y., Jiang X. and Ning, P., "DroidMoss: Detecting repackaged smartphone applications in third-party Android marketplaces," in Proc. of the second ACM conference on Data and Application Security and Privacy, CODASPY'12, 2012.
- Feng Y, Anand S, Dillig I, Aiken A., "Apposcopy: semantics-based detection of Android malware through static analysis," The ACM Sigsoft International Symposium, 576-587, 2014.
- Grace M, Zhou Y, Zhang Q, Zou S and Jiang X., "RiskRanker: scalable and accurate zero-day android malware detection," in Proc. of International Conference on Mobile Systems, Applications, and Services. ACM, 281-294, 2012.
- Zhou Y, Wang Z, Zhou W and Jiang X., "Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets," in Proc. of Annual Network & Distributed System Security Symposium, 2012.
- Yuan Z, Lu Y, Wang Z, Xue Y., "Droid-Sec: deep learning in android malware detection," ACM Sigcomm Computer Communication Review, 44(4):371-372, 2014. https://doi.org/10.1145/2740070.2631434
- Aafer Y, Du W and Yin H., "DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android," Security and Privacy in Communication Networks. Springer International Publishing, 86-103, 2013.
- Arp D, Gascon H, Rieck K, Spreitzenbarth M and Hubner M., "DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket," Network and Distributed System Security Symposium. 2014.
- Androguard. https://code.google.com/p/androguard/.
- Cesare S, Xiang Y., "Classification of malware using structured control flow," Eighth Australasian Symposium on Parallel and Distributed Computing. Australian Computer Society, Inc. 61-70, 2010.
- Sarma B P, Li N, Gates C, Potharaju R and Nita-Rotaru C., "Android permissions: A perspective combining risks and benefits," in Proc. of Acm Symposium on Access Control Models & Technologies Ser Sacmat', 13-22, 2012.
- Peng H, Gates C, Sarma B, Li N and Qi Y., "Using probabilistic generative models for ranking risks of Android apps," in Proc. of Conference on Computer and Communications Security. 241-252, 2012.
- Driankov, Dimiter, Hans Hellendoorn, and Michael Reinfrank, "An introduction to fuzzy control," Springer Science & Business Media, 2013.
- Weka, http://www.cs.waikato.ac.nz/ml/weka.
- Appchina, http://www.appchina.com.
- Anzhi, http://www.anzhi.com.
- Virus share, http://www.virusshare.com.
- Hassana, Doaa, Matthew Might, and Vivek Srikumar, "A Similarity-Based Machine Learning Approach for Detecting Adversarial Android Malware," Technical report UUCS-14-002, School of Computing, University of Utah, 2014.
- Suarez-Tangil G, Tapiador J E, Peris-Lopez P, Blasco J., "Dendroid : A text mining approach to analyzing and classifying code structures in Android malware families," Expert Systems with Applications, 41(4):1104-1117, 2013. https://doi.org/10.1016/j.eswa.2013.07.106
- Gascon H, Yamaguchi F, Arp D and Rieck K., "Structural detection of android malware using embedded call graphs," in Proc. of ACM Workshop on Security and Artificial Intelligence. 45-54, 2013.
Cited by
- A Secure Encryption-Based Malware Detection System vol.12, pp.4, 2018, https://doi.org/10.3837/tiis.2018.04.022
- Method to Analyze Information Leakage Malware using SSL Communication in Android Platform vol.19, pp.3, 2018, https://doi.org/10.7472/jksii.2018.19.3.1
- Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain vol.20, pp.2, 2019, https://doi.org/10.7472/jksii.2019.20.2.61
- Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence vol.108, pp.4, 2017, https://doi.org/10.1007/s11277-019-06540-6
- Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer vol.20, pp.5, 2017, https://doi.org/10.7472/jksii.2019.20.5.9