Computer Science ›› 2016, Vol. 43 ›› Issue (5): 96-99.doi: 10.11896/j.issn.1002-137X.2016.05.018
Previous Articles Next Articles
ZHANG Guo-yin, QU Jia-xing, FU Xiao-jing and HE Zhi-chang
[1] Hu Wen-jun,Zhao Shuang,Tao Jing,et al.A Detection Method and System Implementation for Android Malware[J].Journal of Xi’an Jiaotong University,2013,7(10):37-43(in Chinese) 胡文君,赵双,陶敬,等.一种针对Android平台恶意代码的检测方法及系统实现[J].西安交通大学学报,2013,7(10):37-43 [2] Cai Zhi-biao,Peng Xin-guang.Detection of Android malwarebased on system calls[J].Computer Engineering and Design,2013,4(11):3757-3761(in Chinese) 蔡志标,彭新光.基于系统调用的Android恶意软件检测[J].计算机工程与设计,2013,4(11):3757-3761 [3] Blasing T,Batyuk L.An android application sandbox system for suspicious software detection[C]∥Proceedings of the 5th International Conference on Malicious and Unwanted Software.2010:55-62 [4] Hao Peng,Sarma C G B.Using probabilistic generative models for ranking risks of Android apps[C]∥Proceedings of the 2012 ACM Conference on Computer and Communications Security.2012:241-252 [5] Lu Cheng,Yang Yi-xian.Design and Implementation of Mal-wares Detection System on Android[D].Beijing:Beijing University of Posts and Telecommunications,2012(in Chinese) 路程,杨义先.Android平台恶意软件检测系统的设计与实现[D].北京:北京邮电大学,2012 [6] Android developers.Monkeyrunner.http://developer.android.com/tools/help/ Monkeyrunner_concepts.html [7] Yang Huan,Zhang Yu-qing,Hu Yu-pu,et al.A Malware Beha-vior Detection System of Android Applications Based on Multi-Class Features[J].Chinese Journal of Computers,2014,37(1):15-27(in Chinese) 杨欢,张玉清,胡予濮,等.基于多类特征的Android应用恶意行为检测系统[J].计算机学报,2014,37(1):15-27 [8] Spreitzenbarth M,Freiling F,Echtler F,et al.Mobile-sandbox:having a deeper look into android applications[C]∥Proceedings of the 28th Annual ACM Symposium on Applied Computing.ACM,2013:1808-1815 [9] Hierarchy View.http://developer.android.com/tools/help/hierarchy-viewer.html [10] Karami M,Elsabagh M,Najafiborazjani P,et al.BehavioralAnalysis of Android Applications Using Automated Instrumentation[C]∥Proceedings of the International Conference on Software Security and Reliability Companion.2013:182-187 |
No related articles found! |
|