Characterizing malicious Android apps by mining topic-specific data flow signatures

作者: Xinli Yang , David Lo , Li Li , Xin Xia , Tegawendé F. Bissyandé

DOI: 10.1016/J.INFSOF.2017.04.007

关键词:

摘要: … topic-specific approach to malware comprehension based on app descriptions and data-flow information. First, we use an advanced topic … so-called “topic-specific data flow signatures”. …

参考文章(52)
Andreas Hotho, Alexander Maedche, Steffen Staab, Ontology-based Text Document Clustering. Künstliche Intell.. ,vol. 16, pp. 48- 54 ,(2002)
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala, Quantitative Security Risk Assessment of Android Permissions and Applications Lecture Notes in Computer Science. pp. 226- 241 ,(2013) , 10.1007/978-3-642-39256-6_15
Igor Santos, Yoseba K Penya, Jaime Devesa, Pablo G Bringas, None, N-GRAMS-BASED FILE SIGNATURES FOR MALWARE DETECTION Proceedings of the 11th International Conference on Enterprise Information. pp. 317- 320 ,(2009) , 10.5220/0001863603170320
Finding Groups in Data John Wiley & Sons, Inc.. ,(1990) , 10.1002/9780470316801
Thomas Bäck, Frank Hoffmeister, Extended Selection Mechanisms in Genetic Algorithms. ICGA. pp. 92- 99 ,(1991)
David E. Goldberg, John H. Holland, Genetic Algorithms and Machine Learning Machine Learning. ,vol. 3, pp. 95- 99 ,(1988) , 10.1023/A:1022602019183
Matthieu Kaczmarek, Guillaume Bonfante, Jean-Yves Marion, Control Flow Graphs as Malware Signatures International Workshop on the Theory of Computer Viruses. ,(2007)
L. Darrell Whitley, The GENITOR Algorithm and Selection Pressure: Why Rank-Based Allocation of Reproductive Trials is Best international conference on genetic algorithms. pp. 116- 123 ,(1989)
Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawende F. Bissyande, Jacques Klein, Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection 2015 IEEE International Conference on Software Quality, Reliability and Security. pp. 195- 200 ,(2015) , 10.1109/QRS.2015.36