Identifying Mobile Repackaged Applications through Formal Methods

作者: Fabio Martinelli , Francesco Mercaldo , Vittoria Nardone , Antonella Santone , Corrado Aaron Visaggio

DOI: 10.5220/0006287906730682

关键词:

摘要:

参考文章(17)
Fu Song, Tayssir Touili, Model-Checking for Android Malware Detection asian symposium on programming languages and systems. pp. 216- 235 ,(2014) , 10.1007/978-3-319-12736-1_12
Fu Song, Tayssir Touili, Efficient Malware Detection Using Model-Checking formal methods. pp. 418- 433 ,(2012) , 10.1007/978-3-642-32759-9_34
Claudio Marforio, Srdjan Capkun, Aurélien Francillon, Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems CTIT technical reports series. ,vol. 724, ,(2010) , 10.3929/ETHZ-A-006936208
Fu Song, Tayssir Touili, PoMMaDe: pushdown model-checking for malware detection foundations of software engineering. pp. 607- 610 ,(2013) , 10.1145/2491411.2494599
Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Kernel-based Behavior Analysis for Android Malware Detection computational intelligence and security. pp. 1011- 1015 ,(2011) , 10.1109/CIS.2011.226
Stephan Neuhaus, Thomas Zimmermann, Security Trend Analysis with CVE Topic Models international symposium on software reliability engineering. pp. 111- 120 ,(2010) , 10.1109/ISSRE.2010.53
Grégoire Jacob, Eric Filiol, Hervé Debar, Formalization of Viruses and Malware Through Process Algebras 2010 International Conference on Availability, Reliability and Security. pp. 597- 602 ,(2010) , 10.1109/ARES.2010.59
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, CERT Siemens, DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23247
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
Antonella Santone, Clone detection through process algebras and Java bytecode Proceeding of the 5th international workshop on Software clones - IWSC '11. pp. 73- 74 ,(2011) , 10.1145/1985404.1985422