共 30 条
- [1] Naway A, Li Y., A review on the use of deep learning in android malware detection, International Journal of Computer Science and Mobile Computing, 7, 10, pp. 42-58, (2018)
- [2] Huang H, Cong Z, Zeng J, Et al., Android malware development on public malware scanning platforms: A large-scale data-driven study, Proceedings of the IEEE International Conference on Big Data, pp. 1090-1099, (2016)
- [3] Yang W, Zhang Y, Li J, Et al., Appspear: Bytecode decrypting and dex reassembling for packed android malware, International Workshop on Recent Advances in Intrusion Detection, pp. 359-381, (2015)
- [4] Yue Hongzhou, Zhang Yuqing, Wang Wenjie, Et al., Android static taint analysis of dynamic loading and reflection mechanism, Journal of Computer Research and Development, 54, 2, pp. 313-327, (2017)
- [5] Wang X, Zhu S, Zhou D, Et al., Droid-AntiRM: Taming control flow anti-analysis to support automated dynamic analysis of android malware, Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 350-361, (2017)
- [6] Hoffmann J, Ussath M, Holz T, Et al., Slicing droids: Program slicing for smali code, Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1844-1851, (2013)
- [7] Arzt S, Rasthofer S, Fritz C, Et al., Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android Apps, ACM SIGPLAN Notices, 49, 6, pp. 259-269, (2014)
- [8] Li L, Bartel A, Klein J, Et al., I know what leaked in your pocket: Uncovering privacy leaks on android apps with static taint analysis, (2014)
- [9] Enck W, Gilbert P, Han S, Et al., TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, ACM Transactions on Computer Systems(TOCS), 32, 2, (2014)
- [10] Arp D, Spreitzenbarth M, Hubner M, Et al., DREBIN: Effective and explainable detection of android malware in your pocket, Proceedings of the Network and Distributed System Security Symposiu, pp. 1-12, (2014)