Apposcopy: semantics-based detection of Android malware through static analysis
暂无分享,去创建一个
Isil Dillig | Alexander Aiken | Yu Feng | Saswat Anand | A. Aiken | Yu Feng | Saswat Anand | Işıl Dillig
[1] Jacques Klein,et al. Highly precise taint analysis for Android applications , 2013 .
[2] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[3] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[4] Yannis Smaragdakis,et al. Hybrid context-sensitivity for points-to analysis , 2013, PLDI.
[5] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[6] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[7] Lars Ole Andersen,et al. Program Analysis and Specialization for the C Programming Language , 2005 .
[8] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.
[9] Konrad Rieck,et al. Structural detection of android malware using embedded call graphs , 2013, AISec.
[10] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[11] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[12] Hao Chen,et al. AnDarwin: Scalable Detection of Semantically Similar Android Applications , 2013, ESORICS.
[13] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[14] Monica S. Lam,et al. Using Datalog with Binary Decision Diagrams for Program Analysis , 2005, APLAS.
[15] Jacques Klein,et al. Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis , 2013 .
[16] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[17] Laurie Hendren,et al. Soot: a Java bytecode optimization framework , 2010, CASCON.
[18] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[19] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[20] Thorsten Holz,et al. Slicing droids: program slicing for smali code , 2013, SAC '13.
[21] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[22] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[23] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[24] J. Crussell,et al. Scalable Semantics-Based Detection of Similar Android Applications , 2013 .
[25] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[26] Yannis Smaragdakis,et al. Resolving and exploiting the k-CFA paradox: illuminating functional vs. object-oriented program analysis , 2010, PLDI '10.
[27] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[28] Barbara G. Ryder,et al. Parameterized object sensitivity for points-to analysis for Java , 2005, TSEM.
[29] Yajin Zhou,et al. Fast, scalable detection of "Piggybacked" mobile applications , 2013, CODASPY.
[30] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[31] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[32] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[33] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[34] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[35] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[36] Dawn Xiaodong Song,et al. Contextual Policy Enforcement in Android Applications with Permission Event Graphs , 2013, NDSS.
[37] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.