MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph

作者: Wenjun Hu , Jing Tao , Xiaobo Ma , Wenyu Zhou , Shuang Zhao

DOI: 10.1109/ICCCN.2014.6911805

关键词:

摘要: … We then divide the method invocation graph into sub-graphs. … method invocation graph and processing sub-graphs, we need … , we calculated each subgraph’s threat score according to …

参考文章(8)
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing information security. pp. 62- 69 ,(2012) , 10.1109/ASIAJCIS.2012.18
Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, Xuxian Jiang, RiskRanker Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12. pp. 281- 294 ,(2012) , 10.1145/2307636.2307663
William Enck, Machigar Ongtang, Patrick McDaniel, Understanding Android Security ieee symposium on security and privacy. ,vol. 7, pp. 50- 57 ,(2009) , 10.1109/MSP.2009.26
Vaibhav Rastogi, Yan Chen, William Enck, AppsPlayground Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 209- 220 ,(2013) , 10.1145/2435349.2435379
Xuxian Jiang, Yajin Zhou, Michael C. Grace, Zhi Wang, Systematic Detection of Capability Leaks in Stock Android Smartphones. network and distributed system security symposium. ,(2012)
Xuxian Jiang, Yajin Zhou, Wu Zhou, Zhi Wang, Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets network and distributed system security symposium. ,(2012)