[1] 李寅, 范明钰, 王光卫. 基于反编译的Android平台恶意代码静态分析[J]. 计算机系统应用, 2012, 21(11):187-189
[2] 李挺, 董航, 袁春阳,等. 基于Dalvik指令的Android恶意代码特征描述及验证[J]. 计算机研究与发展, 2014, 51(7):1458-1466
[3] Kang B, Kang B J, Kim J, et al. Android malware classification method:Dalvik bytecode frequency analysis[C]// Research in Adaptive and Convergent Systems. 2013:349-350
[4] Chen T, Yang Y, Bo C. Maldetect:An Android malware detection system based on abstraction of Dalvik instructions[J]. Journal of Computer Research & Development, 2016, 53(10):2299-2306
[5] 李自清. 基于函数调用图的Android恶意代码检测方法研究[J]. 计算机测量与控制, 2017, 25(10):198-201
[6] Sun M, Tan G. NativeGuard:protecting android applications from third-party native libraries[C]// Proc of the 2014 ACM Conf on Security and Privacy in Wireless & Mobile Networks.New York:ACM, 2014:165-176
[7] 陈新. 基于程序控制流图源代码相似程度分析系统[J]. 计算机系统应用, 2013, 22(3):144-147
[8] 吕博然, 吴军华. 基于路径序列相似度判别的程序克隆检测方法[J].计算机工程与应用, 2018,54(2):55-61
[9] Garey M R, Johnson D S. Computers and Intractability: A Guide to the Theory of NP-Completeness[M]. New York:W H Freeman and Company, 1983. 208-209
[10] Ullmann J R. An algorithm for subgraph isomorphism[J]. Journal of the ACM, 1976, 23(1):31-42
[11] Cordella L P, Foggia P, Sansone C, et al. A (sub)graph isomorphism algorithm for matching large graphs[J]. IEEE Trans on Pattern Analysis & Machine Intelligence, 2004, 26(10):1367-1372
[12] Arp D, Spreitzenbarth M, Hübner M, et al. DREBIN: Effective and explainable detection of Android malware in your pocket[C]// Network and Distributed System Security Symp. 2014
|