Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 324-328.doi: 10.11896/j.issn.1002-137X.2016.11A.076
Previous Articles Next Articles
NING Zhuo, HU Ting and SUN Zhi-xin
[1] Analytics S.Global Business Smartphone Quarterly TrackingQ4 2015.https://www.strategyanalytics.com/access-services/enterprise/mobile-workforce/market-data/report-detail/global-business-smartphone-quarterly-tracking-q4-2015#.VxX2J7IgIjY [2] The 2015 U.S.Mobile App Report.https://www.comscore.com/Insights/Presentations-and-Whitepapers/2015/The-2015-US-Mobile-App-Report [3] Labs M.Mobile Threat Report:What’s on the Horizon for 2016.http://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2016.pdf [4] Ded:Decompiling Android applications.http://siis.cse.psu.edu/ded [5] Dex2Jar.Android decompiling with Dex2jar.http://code.google.com/p/dex2jar [6] 屈延文.软件行为学[M].北京:电子工业出版社,2004 [7] Blsing T,Batyuk L,Schmidt A D,et al.An android application sandbox system for suspicious software detection[C]∥2010 5th International Conference on Malicious and Unwanted Software (MALWARE).IEEE,2010:55-62 [8] Enck W,Gilbert P,Han S,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J].ACM Transactions on Computer Systems (TOCS),2014,32(2):5 [9] Desnos A,Lantz P.Droidbox:An android application sandboxfor dynamic analysis.URL.https://code.google.com/p/droidbox,2014 [10] Yan L K,Yin H.Droidscope:seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis[C]∥Presented as part of the 21st USENIX Security Sympo-sium (USENIX Security 12).2012:569-584 [11] Portokalidis G,Homburg P,Anagnostakis K,et al.Paranoid Android:versatile protection for smartphones[C]∥Proceedings of the 26th Annual Computer Security Applications Conference.ACM,2010:347-356 [12] Weichselbaum L,Neugschwandtner M,Lindorfer M,et al.Andrubis:Android malware under the magnifying glass[R].Vienna University of Technology,Tech.Rep.TRISECLAB-0414,2014 [13] Rastogi V,Chen Y,Enck W.AppsPlayground:automatic security analysis of smartphone applications[C]∥Proceedings of the third ACM conference on Data and application security and privacy.ACM,2013:209-220 [14] API Monitor.Rohitab Batra.http://www.rohitab.com/apimonitor [15] Drozer-A Comprehensive Security and Attack Framework forAndroid.https://www.mwrinfosecurity.com/products/drozer [16] Faruki P,Bhandari S,Laxmi V,et al.DroidAnalyst:SynergicApp Framework for Static and Dynamic App Analysis[M]∥Recent Advances in Computational Intelligence in Defense and Security.Springer International Publishing,2016:519-552 [17] Shabtai A,Kanonov U,Elovici Y,et al.“Andromaly”:a beha-vioral malware detection framework for android devices[J].Journal of Intelligent Information Systems,2012,38(1):161-190 [18] Burguera I,Zurutuza U,Nadjm-Tehrani S.Crowdroid:behavior-based malware detection system for android[C]∥Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.ACM,2011:15-26 [19] Zheng C,Zhu S,Dai S,et al.Smartdroid:an automatic systemfor revealing ui-based trigger conditions in android applications[C]∥Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.ACM,2012:93-104 [20] Tam K,Khan S J,Fattori A,et al.CopperDroid:Automatic Reconstruction of Android Malware Behaviors[C]∥NDSS.2015 [21] Spreitzenbarth M,Schreck T,Echtler F,et al.Mobile-Sandbox:combining static and dynamic analysis with machine-learning techniques[J].International Journal of Information Security,2015,14(2):141-153 [22] Zhang Y,Yang M,Yang Z,et al.Permission use analysis for vetting undesirable behaviors in android apps[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1828-1842 [23] Xu R,Sadi H,Anderson R.Aurasium:Practical policy enforcement for android applications[C]∥Presented as part of the 21st USENIX Security Symposium (USENIX Security 12).2012:539-552 [24] Zheng M,Sun M,Lui J.Droidtrace:A ptrace based android dynamic analysis system with forward execution capability[C]∥2014 International Wireless Communications and Mobile Computing Conference (IWCMC).IEEE,2014:128-133 |
No related articles found! |
|