参考文献
|
-
J. Freke, “smali: An assembler/disassembler for Android's dex format.” [Online].Available: https://github.com/JesusFreke/smali
-
F-Droid.org, “F-Droid: Free and open source app repository.” [Online]. Available: https://f-droid.org/
-
C. Tumbleson, “A tool for reverse engineering Android apk files.” [Online].Available: http://ibotpeaches.github.io/Apktool/
-
V. Roubtsov, “EMMA: a free Java code coverage tool.” [Online]. Available: http://emma.sourceforge.net/
-
A. Desnos and G. Gueguen, “Reverse engineering, malware and goodware analysis of android applications ... and more (ninja !).” [Online]. Available: https://github.com/androguard/androguard
-
Android, “UI/Application exerciser Monkey.”[Online]. Available: http://developer.android.com/tools/help/monkey.html
-
C. Florian, “Most vulnerable operating systems and applications in 2014,”February 2015. [Online]. Available: http://www.gfi.com/blog/most-vulnerableoperating-systems-and-applications-in-2014/
-
Google, Inc., “Google settings (android): Protect against harmful apps.” [Online].Available: https://support.google.com/accounts/answer/2812853
-
D. Slife and M. Chesney, “jCello.” [Online]. Available: http://jcello.sourceforge.net/
-
International Secure Systems Lab (iSecLab), “Anubis: Malware analysis for unknown binaries.” [Online]. Available: http://anubis.iseclab.org/
-
S. Chiba, “Javassist: Java bytecode engineering toolkit since 1999.” [Online]. Available: http://jboss-javassist.github.io/javassist/
-
International Data Corporation, “Smartphone OS market share, Q2 2015.”[Online]. Available: http://www.idc.com/prodserv/smartphone-os-market-share.jsp
-
P. Lantz and A. Desnos, “DroidBox: An android application sandbox for dynamic analysis.” [Online]. Available: https://code.google.com/p/droidbox/
-
V. van der Veen and C. Rossow, “Tracedroid - dynamic Android app analysis.”[Online]. Available: http://tracedroid.few.vu.nl/
-
VirusTotal, “VirusTotal - free online virus, malware and URL scanner.” [Online].Available: https://www.virustotal.com/
-
Antunes, N.,Vieira, M.(2015).Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples.IEEE Transactions on Services Computing,8(2),269-283.
-
Bayer, U.,Kruegel, C.,Kirda, E.(2006).TTAnalyze: A tool for analyzing malware.Proceedings of the 15th European Institute for Computer Antivirus Research Annual Conference, ser. EICAR
-
Blsing, T.,Batyuk, L.,Schmidt, A.-D.,Camtepe, S.,Albayrak, S.(2010).An android application sandbox system for suspicious software detection.Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE)
-
Bruschi, D.,Martignoni, L.,Monga, M.(2006).Detecting selfmutating malware using control-flow graph matching.Proceedings of the 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment
-
Burguera, I.,Zurutuza, U.,Nadjm-Tehrani, S.(2011).Crowdroid: Behavior-based malware detection system for Android.Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM
-
Chen, M.H.,Lyu, M. R.,Wong, W. E.(2001).Effect of code coverage on software reliability measurement.IEEE Transactions on Reliability,50(2),165-170.
-
Enck, W.,Gilbert, P.,Chun, B.-G.,Cox, L. P.,Jung, J.,Mc-Daniel, P.,Sheth, A. N.(2010).TaintDroid: An information flow tracking system for realtime privacy monitoring on smartphones.Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI'10,Berkeley, CA, USA:
-
Enck, W.,Octeau, D.,McDaniel, P.,Chaudhuri, S.(2011).A study of android application security.Proceedings of the 20th USENIX Conference on Security
-
Horvth, F.,Bognr, S.,Gergely, T.,Rcz, R.,Beszdes, A.,Marinkovic, V.(2014).Code coverage measurement framework for android devices.Acta Cybernetica,21,439-458.
-
Huang, C.-Y.,Chiu, C.-H.,Lin, C.-H.,Tzeng, H.-W.(2015).Code coverage measurement for android dynamic analysis tools.Proceedings of IEEE International Conference on Mobile Services
-
Huffman, D. A.(1952).A method for the construction of minimum-redundancy codes.Proceedings of the I.R.E,40,1098-1101.
-
Lindorfer, M.,Neugschwandtner, M.,Weichselbaum, L.,Fratantonio, Y.,van der Veen, V.,Platzer, C.(2014).Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors.Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
-
Machiry, A.,Tahiliani, R.,Naik, M.(2013).Dynodroid: An input generation system for android apps.Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ser. ESEC/FSE 2013,New York, NY, USA:
-
Maggi, F.,Valdi, A.,Zanero, S.(2013).Andrototal: A flexible, scalable toolbox and service for testing mobile malware detectors.Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-
Mahmood, R.,Esfahani, N.,Kacem, T.,Mirzaei, N.,Malek, S.,Stavrou, A.(2012).A whitebox approach for automated security testing of android applications on the cloud.Proceedings of the 7th International Workshop on Automation of Software Test, ser. AST '12,Piscataway, NJ, USA:
-
Marek, L.,Zheng, Y.,Ansaloni, D.,Sarimbekov, A.,Binder, W.,Tma, P.,Qi, Z.(2012).Java bytecode instrumentation made easy: The DiSL framework for dynamic program analysis.Proceedings of the 10th Asian Symposium on Programming Languages and Systems
-
Mei, L.,Cai, Y.,Jia, C.,Jiang, B.,Chan, W. K.,Zhang, Z.,Tse, T. H.(2015).A subsumption hierarchy of test case prioritization for composite services.IEEE Transactions on Services Computing,8(5),658-673.
-
Reina, A.,Fattori, A.,Cavallaro, L.(2013).A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors.Proceedings of the 6th European Workshop on System Security (EUROSEC),Prague, Czech Republic:
-
Ryder, B. G.(1979).Constructing the call graph of a program.IEEE Transactions on Software Engineering,SE-5(5),216-226.
-
Seesing, A.,Orso, A.(2005).InsECTJ: a generic instrumentation framework for collecting dynamic information within Eclipse.Proceedings of the 2005 OOPSLA workshop on Eclipse technology eXchange
-
Tam, K.,Khan, S. J.,Fattori, A.,Cavallaro, L.(2015).CopperDroid: Automatic reconstruction of Android malware behaviors.Proceedings of the Network and Distributed System Security Symposium
-
van der Veen, V.(2013).VU University Amsterdam.
-
Xie, L.,Zhang, X.,Seifert, J.-P.,Zhu, S.(2010).pBMDS: A behavior-based malware detection system for cellphone devices.Proceedings of the Third ACM Conference on Wireless Network Security, ser. WiSec '10,New York, NY, USA:
-
Yan, L. K.,Yin, H.(2012).DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis.Proceedings of the 21st USENIX Security Symposium, ser. Security'12,Berkeley, CA, USA:
-
Zhou, Y.,Wang, Z.,Zhou, W.,Jiang, X.(2012).Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets.Proceedings of the Network and Distributed System Security Symposium
|