References
- Kasperskey Lab, 2014, "Mobile Cyber Threats" [Internet], http://media.kaspersky.com/pdf/Kaspersky-Lab-KSN-Report-mobile-cyberthreats-web.pdf.
- Gartner, "Worldwide Smartphone Sales to End User by Operating System in 2Q15," 2015.
- McAfee, "Mobile Threat Report, What's on the Horizon for 2016" [Internet], http://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2016.pdf.
- Felt, Adrienne Porter et al., "A survey of mobile malware in the wild," Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ACM, 2011.
- Sarma, Bhaskar Pratim et al., "Android permissions: a perspective combining risks and benefits," Proceedings of the 17th ACM symposium on Access Control Models and Technologies, ACM, 2012.
- Aafer, Yousra, Wenliang Du, and Heng Yin, "DroidAPIMiner: Mining API-level features for robust malware detection in android," International Conference on Security and Privacy in Communication Systems, Springer International Publishing, 2013.
- Felt, Adrienne Porter et al., "Android permissions demystified," Proceedings of the 18th ACM conference on Computer and communications security, ACM, 2011.
- Rastogi, Vaibhav, Yan Chen, and William Enck, "AppsPlayground: automatic security analysis of smartphone applications," Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM, 2013.
- Enck, William et al., "TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones," ACM Transactions on Computer Systems (TOCS), Vol.32, No.2, p.5, 2014.
- Yan, Lok Kwong, and Heng Yin, "Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis," Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 2012.
- Peiravian, Naser, and Xingquan Zhu, "Machine learning for android malware detection using permission and api calls," 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, IEEE, 2013.
- Arp, Daniel et al., "DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket," NDSS, 2014.
- LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton, "Deep learning," Nature, Vol.521, No.7553, pp.436-444, 2015. https://doi.org/10.1038/nature14539
- Zhou, Yajin, and Xuxian Jiang, "Dissecting android malware: Characterization and evolution," 2012 IEEE Symposium on Security and Privacy, IEEE, 2012.
- Crussell, Jonathan, Clint Gibler, and Hao Chen, "Attack of the clones: Detecting cloned applications on android markets," European Symposium on Research in Computer Security, Springer Berlin Heidelberg, 2012.
- Indyk, Piotr, and Rajeev Motwani, "Approximate nearest neighbors: towards removing the curse of dimensionality," Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, ACM, 1998.
- TLSH [Internet], https://github.com/trendmicro/tlsh.
- TensorFlow [Internet], https://www.tensorflow.org/.
- Srivastava, Nitish et al., "Dropout: a simple way to prevent neural networks from overfitting," Journal of Machine Learning Research, Vol.15, No.1, pp.1929-1958, 2014.
- Contagio Community [Internet], http://contagiominidump.blo gspot.com.