[1] B. Sanz, I. Santos, C. Laorden, et al. PUMA: Permission Usage to Detect Malware in Android[C]//Proc of International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Berlin: Springer, 2013: 289-298
[2] Y Aafer, W Du, H. Yin. DroidAPIMiner: Mining API-level features for robust malware detection in andoid[C]//Proc of International Conference on Security and Privacy in Communication Systems. Cham: Springer, 2013: 86-103
[3] S. Rosen, Z. Qian, Z. Morley Mao. Appprofler: a flexible method of exposing privacy-related behavior in android applications to end users[C]//Proc of the 3th ACM conference on Data and application security and privacy. New York: ACM, 2013:221-232
[4] A.-D. Schmidt, R. Bye, H.-G. Schmidt, et al. Static analysis of executables for collaborative malware detection on android[C]//Proc of Communications ICC’09. Dresden: IEEE, 2009
[5] Wu, D.-J., et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing[C]//Proc of the 7th Asia Joint Conference in Information Security (Asia JCIS). Tokyo: IEEE, 2012
[6] T. Abou-Assaleh, N. Cercone, V. Keselj, et al. N-gram Based Detection of New Malicious Code[C]//Proc of the 28th Annual International Computer Software and Applications Conference. DC: IEEE, 2004
[7] J.Z. Kolter, M.A. Maloof. Learning to detect malicious executables in the wild[C]//Proc of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. New York:ACM,2004:470-478
[8] Yajin Zhou, Zhi Wang, Wu Zhou, et al. Hey,you,get off of my market: Detecting malicious apps in official and alternative android markets[C]//Proc of the 19th Annual Network and Distributed System Security Symposium. San Diego: Internet Society, 2012
[9] D. Barrera, H. G. Kayacik, P. C. van Oorschot, et al. A methodology for empirical analysis of permission-based security models and its application to android[C]//Proc of the 17th ACM conference on Computer and communications security. New York: ACM, 2010
[10] 孙伟. 一种静态Android重打包恶意应用检测方法[J]. 信息安全研究, 2017, 3(8): 692-700.
[11] I. Burguera, I. Burguera, U.Z., Nadijm-Tehrani, S.. Crowdroid: Behavior-Based Malware Detection System for Android[C]//Proc of the 1st ACM workshop on Security and privacy in smartphones and mobile devices. New York: ACM, 2011
[12] William Enck, Peter Gilbert, Byung-Gon Chun, et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones[C]//Proc of the 9th USENIX conference on Operating systems design and implementation. CA:USENIX Association Berkeley, 2010
[13] C. Bishop. Pattern Recognition and Machine Learning[M]. New York: Springer, 2006
[14] O. Chapelle, B. Scholkopf, and A. Zien. Semi-supervised Learning[M]. Cambridge: MIT press, 2006 |