Detecting and classifying android malware using static analysis along with creator information

作者: Hyunjae Kang , Jae-wook Jang , Aziz Mohaisen , Huy Kang Kim , None

DOI: 10.1155/2015/479174

关键词:

摘要: … Similarity score between two kinds of malware is computed by using each similarity 𝑆𝑖 of suspicious API string, malicious commands, and critical permissions. The similarity score SS …

参考文章(17)
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
Min Zheng, Mingshen Sun, John C.S. Lui, Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. pp. 163- 171 ,(2013) , 10.1109/TRUSTCOM.2013.25
Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, Xuxian Jiang, RiskRanker Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12. pp. 281- 294 ,(2012) , 10.1145/2307636.2307663
Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy, Using probabilistic generative models for ranking risks of Android apps Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 241- 252 ,(2012) , 10.1145/2382196.2382224
Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim, Detecting mobile malware threats to homeland security through static analysis Journal of Network and Computer Applications. ,vol. 38, pp. 43- 53 ,(2014) , 10.1016/J.JNCA.2013.05.008
Michael Spreitzenbarth, Felix Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann, Mobile-sandbox: having a deeper look into android applications acm symposium on applied computing. pp. 1808- 1815 ,(2013) , 10.1145/2480362.2480701
Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David Wagner, AdDroid: privilege separation for applications and advertisers in Android computer and communications security. pp. 71- 72 ,(2012) , 10.1145/2414456.2414498
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, David Lie, PScout Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 217- 228 ,(2012) , 10.1145/2382196.2382222