Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2017_2_a6, author = {A. A. Skovoroda and D. Y. Gamayunov}, title = {Automated static analysis and classification of {Android} malware using permission and {API} calls models}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {84--105}, publisher = {mathdoc}, number = {2}, year = {2017}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2017_2_a6/} }
TY - JOUR AU - A. A. Skovoroda AU - D. Y. Gamayunov TI - Automated static analysis and classification of Android malware using permission and API calls models JO - Prikladnaâ diskretnaâ matematika PY - 2017 SP - 84 EP - 105 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2017_2_a6/ LA - ru ID - PDM_2017_2_a6 ER -
%0 Journal Article %A A. A. Skovoroda %A D. Y. Gamayunov %T Automated static analysis and classification of Android malware using permission and API calls models %J Prikladnaâ diskretnaâ matematika %D 2017 %P 84-105 %N 2 %I mathdoc %U http://geodesic.mathdoc.fr/item/PDM_2017_2_a6/ %G ru %F PDM_2017_2_a6
A. A. Skovoroda; D. Y. Gamayunov. Automated static analysis and classification of Android malware using permission and API calls models. Prikladnaâ diskretnaâ matematika, no. 2 (2017), pp. 84-105. http://geodesic.mathdoc.fr/item/PDM_2017_2_a6/
[1] Skovoroda A., Gamayunov D., “Securing mobile devices: malware mitigation methods”, J. Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6:2 (2015), 78–97
[2] Egele M., Kruegel C., Kirda E., Vigna G., “PiOS: Detecting privacy leaks in iOS applications”, Proc. 18th Annual Network and Distributed System Security Symposium, NDSS, San Diego, CA, USA, 2011 http://www.eurecom.fr/publication/3282
[3] Enck W., Gilbert P., Chun B.-G., et al., “TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones”, Proc. 9th USENIX Conf. Design and Implementation, OSDI'10, USENIX Association, Vancouver, BC, Canada, 2010, 1–6
[4] Shabtai A., Tenenboim-Chekina L., Mimran D., et al., “Mobile malware detection through analysis of deviations in application network behavior”, Computers Security, 43 (2014), 1–18 | DOI
[5] Kim H., Smith J., Shin K. G., “Detecting energy-greedy anomalies and mobile malware variants”, Proc. 6th Intern. Conf. Applications, and Services, MobiSys'08, ACM, Breckenridge, CO, USA, 2008, 239–252
[6] Grace M., Zhou Y., Zhang Q., et al., “RiskRanker: scalable and accurate zero-day android malware detection”, Proc. 10th Intern. Conf. Applications, and Services, MobiSys'12, ACM, Low Wood Bay, Lake District, UK, 2012, 281–294
[7] Feng Y., Anand S., Dillig I., Aiken A., “Apposcopy: Semantics-based detection of android malware through static analysis”, Proc. 22nd ACM SIGSOFT Intern. Symp., FSE 2014, ACM, New York, NY, USA, 2014, 576–587 | DOI
[8] Tam K., Feizollah A., Anuar N. B., et al., “The evolution of android malware and android analysis techniques”, ACM Comput. Surv., 49:4 (2017), Article No. 76 | DOI | MR
[9] Yang L., Ganapathy V., Iftode L., “Enhancing mobile malware detection with social collaboration”, Proc. 2011 IEEE Third Intern. Conf. Social Computing, SocialCom, IEEE, Boston, MA, 2011, 572–576
[10] Liu L., Yan G., Zhang X., Chen S., “VirusMeter: preventing your cellphone from spies”, LNCS, 5758, 2009, 244–264
[11] Hoffmann J., Neumann S., Holz T., “Mobile malware detection based on energy fingerprints – a dead end?”, LNCS, 8145, 2013, 348–368
[12] Wong M. Y., Lie D., “Intellidroid: a targeted input generator for the dynamic analysis of android malware”, NDSS, 2016 | DOI
[13] Zhou Y., Wang Z., Zhou W., Jiang X., “Hey, you, get off of my market: detecting malicious apps in official and alternative android markets”, Proc. 19th Annual NDDS Symp., The Internet Society, San Diego, CA, USA, 2012 https://www.internetsociety.org/sites/default/files/07_5.pdf
[14] Aafer Y., Du W., Yin H., “DroidAPIMiner: Mining API-level features for robust malware detection in android”, Security and Privacy in Communication Networks, eds. T. Zia, A. Zomaya, V. Varadharajan, M. Mao, Springer International Publishing, 2013, 86–103 | DOI
[15] Zhang M., Duan Y., Yin H., Zhao Z., “Semantics-aware android malware classification using weighted contextual API dependency graphs”, Proc. ACM SIGSAC Conf., CCS'14, ACM, New York, NY, USA, 2014, 1105–1116
[16] Arp D., Spreitzenbarth M., Huebner M., et al., “Drebin: efficient and explainable detection of android malware in your pocket”, Proc. NDSS Symp., The Internet Society, San Diego, CA, USA, 2014 https://www.internetsociety.org/sites/default/files/11_3_1.pdf
[17] Damshenas M., Dehghantanha A., Choo K., Mahmud R., “M0Droid: an android behavioral-based malware detection model”, J. Inform. Privacy Security, 11:3 (2015), 141–157 | DOI
[18] Aresu M., Ariu D., Ahmadi M., et al., “Clustering android malware families by http traffic”, Proc. MALCON'2015, Fajardo, Puerto Rico, USA, 2015 https://pralab.diee.unica.it/sites/default/files/MALCON_0.pdf
[19] Mariconti E., Onwuzurike L., Andriotis P., et al., Mamadroid: Detecting android malware by building markov chains of behavioral models, 2016, arXiv: 1612.04433
[20] Gascon H., Yamaguchi F., Arp D., Rieck K., “Structural detection of android malware using embedded call graphs”, Proc. AISec'13, ACM, New York, NY, USA, 2013, 45–54
[21] Yang Z., Yang M., Zhang Y., et al., “AppIntent: analyzing sensitive data transmission in android for privacy leakage detection”, Proc. CCS'13, ACM, Berlin, Germany, 2013, 1043–1054
[22] Rosen S., Qian Z., Mao Z. M., “AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users”, Proc. Third ACM Conf. CODASPY'13, ACM, San Antonio, Texas, USA, 2013, 221–232 | DOI
[23] Portokalidis G., Homburg P., Anagnostakis K., Bos H., “Paranoid android: versatile protection for smartphones”, Proc. 26th Annual Conf. ACSAC'10, ACM, Austin, Texas, USA, 2010, 347–356
[24] Burguera I., Zurutuza U., Nadjm-Tehrani S., “Crowdroid: behavior-based malware detection system for android”, Proc. 1st ACM Workshop SPSM'11, ACM, Chicago, Illinois, USA, 2011, 15–26
[25] Permissions, , 2017 http://developer.android.com/intl/ru/guide/topics/security/permissions.html
[26] Androguard, , 2017 https://github.com/androguard/androguard
[27] Au K. W. Y., Zhou Y. F., Huang Z., Lie D., “PScout: analyzing the android permission specification”, Proc. ACM Conf. CCS'12, ACM, New York, NY, USA, 2012, 217–228
[28] Lu L., Li Z., Wu Z., et al., “CHEX: statically vetting android apps for component hijacking vulnerabilities”, Proc. ACM Conf. CCS'12, ACM, New York, NY, USA, 2012, 229–240
[29] Kollektsiya vredonosnykh prilozhenii UNB ISCX Android Botnet, , 2017 http://www.unb.ca/research/iscx/dataset/iscx-android-botnet-dataset.html
[30] DroidBox: Sendboksing Android-prilozhenii, , 2017 http://code.google.com/p/droidbox/
[31] Adagio, , 2017 https://github.com/hgascon/adagio