Citation: | LI Pengwei, FU Jianming, XU Chao, et al., “Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features,” Chinese Journal of Electronics, vol. 28, no. 5, pp. 944-952, 2019, doi: 10.1049/cje.2019.06.014 |
K. Olejnik, I. Dacosta, J.S. Machado, et al., "Smarper:Context-aware and automatic runtime-permissions for mobile devices", Proc. of IEEE Symposium on Security and Privacy, Oakland, California, USA, pp.1058-1076, 2017.
|
A. Dawoud and S. Bugiel. "DroidCap:OS support for capability-based permissions in android network and distributed systems security", Proc. of Network and Distributed System Security Symposium, San Diego, CA, USA, 2019.
|
M. Zhang, Y. Duan, H. Yin, et al., "Semantics-aware android malware classification using weighted contextual API dependency graphs", Proc. of ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, pp.1105-1116,2014.
|
T. Li, H. Dong, C.Y. Yuan, et al., "Description of android malware feature based on Dalvik instructions", Journal of Computer Research and Development, Vol.51, No.7, pp.1458-1466, 2015.
|
V.Rastogi, Y. Chen, and X. Jiang. "Droidchameleon:Evaluating Android antimalware against transformation attacks", Proc. of ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, pp.329-334, 2013.
|
K. Allix, Q. Jerome, T.F. Bissyande, et al., "A forensic analysis of android malware-how is malware written and how it could be detected?", Proc. of IEEE 38th Annual Computer Software and Applications Conference, Vasteras, Sweden, pp.384-393, 2014.
|
J. Huang, X. Zhang, L. Tan, et al., "AsDroid:Detecting stealthy behaviors in Android applications by user interface and program behavior contradiction", Proc. of the 36th International Conference on Software Engineering. Hyderabad, India, PP.1036-1046, 2014.
|
K.O. Elish, X. Shu, D.D. Yao, et al., "Profiling user-trigger dependence for Android malware detection", Computers & Security, Vol.49, pp.255-273, 2015.
|
W. Yang, X. Xiao, B. Andow, et al., "AppContext:Differentiating malicious and benign mobile app behaviors using context", Proc. of the International Conference on Software Engineering, Firenze, Italy, pp.303-313, 2015.
|
R. Pandita, X. Xiao, W. Yang, et al., "WHYPER:Towards automating risk assessment of mobile applications", Proc. of the 22th USENIX Conference on Security, USENIX Association Berkeley, Berkeley, CA, USA, pp.527-542, 2013.
|
Z. Qu, V. Rastogi, X. Zhang, et al., "AutoCog:Measuring the descriptionto-permission fidelity in Android applications", Proc. of the ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, USA, pp.1354-1365, 2014.
|
A. Gorla, I. Tavecchia, F. Gross, et al., "Checking app behavior against app descriptions", Proc. of the 36th International Conference on Software Engineering, Hyderabad, India, pp.1025-1035, 2014.
|
K. Lu, Z. Li, V.P. Kemerlis, et al., "Checking more and alerting less:Detecting privacy leakages via enhanced data-flow analysis and peer voting", Proc. of Network and Distributed System Security Symposium, San Diego, California, USA, 2015.
|
F.G. Wei, S. Roy and X. Ou, "Amandroid:A precise and general inter-component data flow analysis framework for security vetting of Android Apps", Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, USA, pp.1329-1341, 2014.
|
F.G. Wei, Yuping Li, S. Roy, et al., "Deep ground truth analysis of current Android malware". Proc. of the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Bonn, Germany, 2017.
|
V. Avdiienko, K. Kuznetsov, A. Gorla, et al., "Mining apps for abnormal usage of sensitive data", Proc. of the International Conference on Software Engineering, Firenze, Italy, pp.426-436. 2015
|
X.Pan, X.Wang, Y.Duan, et al., "Dark Hazard:Learningbased, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps", Proc. of Network and Distributed System Security Symposium, San Diego, California, USA, 2017.
|
Z.G. Wang, C.L. Li and L.S. Zhang. "A privacy stealing detection method based on behavior-chain for android applications", Acta Electronica Sinica, Vol.43, No.9, pp.1750-1755, 2015. (in Chinese)
|