参考文献
|
-
陳嘉玫、江玟璟、歐雅惠(2014)。開放資料應用於行動惡意程式分析研究。電子商務研究,12(3),319-335。
連結:
-
Spreitzenbarth, M. (2012).Forensic blog: Mobile phone forensics and mobile malware.Retrieved October 15, 2013,fromhttp://forensics.spreitzenbarth.de/2012/02/12/detailed-analysis-of-android-b master/
-
AndroLib. (2014). Number of new applications in Android market by month.Retrieved May 15, 2014, from http://www.androlib.com/appstats.aspx
-
Symantec.(2012).Security response. Retrieved October 15, 2013, from http://www.symantec.com/security_response/
-
Arsene, L. (2012). Android mobile malware report - 2012. Retrieved October 15,2013, from http://www.hotforsecurity.com/blog/android-mobile-malware-report-august-2012-3459.html
-
Apvrille, A.,Strazzere, T.(2012).Reducing the window of opportunity for Android malware Gotta catch'em all.Journal in Computer Virology,8(1-2),61-71.
-
Chess, B.,West, J.(2007).Secure programming with static analysis.MA:Addison-Wesley Professional.
-
Dai, S.(2010).Behavior-based malware detection on mobile phone.Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM),Chengdu, China:
-
F-Secure(2012).,未出版
-
Grace, M.,Zhou, Y.,Zhang, Q.,Zou, S.,Jiang, X.(2012).RiskRanker: Scalable and accurate zero-day android malware detection.Proceedings of the 10th international conference on Mobile systems, applications, and services,Ambleside, UK.:
-
Kang, Y.,Park, C.,Wu, C.(2007).Reverse-engineering 1-n associations from Java bytecode using alias analysis.Journal of Information and Software Technology,49(2),81-98.
-
Kim, H.,Smith, J.,Shin, K. G.(2008).Detecting energy-greedy anomalies and mobile malware variants.Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services,Colorado, USA:
-
McAfee(2013).,未出版
-
Nauman, M.,Khan, S.,Zhang, X.(2010).Apex: Extending Android permission model and enforcement with user-defined runtime constraints.Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security,Beijing, China:
-
Schmidt, A. D.,Schmidt, H. G.,Batyuk, L.,Clausen, J. H.,Camtepe, S. A.,Albayrak, S.,Yildizli, C.(2009).Smartphone malware evolution revisited Android next target?.Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE 2009),Montreal, Canada:
-
Shabtai, A.,Kanonov, U.,Elovici, Y.(2010).Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.Journal of Systems and Software,83(8),1524-1537.
-
Shabtai, A.,Kanonov, U.,Elovici, Y.,Glezer, C.,Weiss, Y.(2012)."Andromaly": A behavioral malware detection framework for android devices.Journal of Intelligent Information Systems,38(1),161-190.
-
Wu, D. J.,Mao, C. H.,Wei, T. E.,Lee, H. M.,Wu, K. P.(2012).DroidMat: Android malware detection through manifest and API calls tracing.Proceedings of the7th Asia Joint Conference on Information Security,Tokyo, Japan:
-
Zhou, Y.,Jiang, X.(2012).Dissecting Android malware: Characterization and evolution.Proceedings of the 33rd IEEE Symposium on Security and Privacy,California, USA.:
-
劉清雲、施汎勳(2014)。行動應用程式檢測與鑑識。台灣駭客年會(HITCON 2014),台灣,台北市:
|