References(34)
[2]
Vidas T., Votipka D., and Christin N., All your droid are belong to us: A survey of current Android attacks, in Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT), 2011, pp. 81–90.
[3]
Felt A. P., Finifter M., Chin E., Hanna S., and Wagner D., A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 3–14.
[5]
Mylonas A., Kastania A., and Gritzalis D., Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol. 34, pp. 47–66, 2013.
[6]
Fang Z., Han W., and Li Y., Permission based Android security: Issues and countermeasures, Computers & Security, vol. 43, pp. 205–218, 2014.
[7]
Xu J., Yu Y.-T., Chen Z., Cao B., Dong W., Guo Y., and Cao J., Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining, Tsinghua Science and Technology, vol. 18, no. 4, pp. 418–427, 2013.
[8]
Pandita R., Xiao X., Yang W., Enck W., and Xie T., Whyper: Towards automating risk assessment of mobile applications, in Proceedings of the 22nd USENIX Security Symposium (USENIX Security), 2013, pp. 527–542.
[9]
Qu Z., Rastogi V., Zhang X., Chen Y., Zhu T., and Chen Z., Autocog: Measuring the description-to-permission fidelity in Android applications, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014, pp. 1354–1365.
[10]
Geneiatakis D., Fovino I. N., Kounelis I., and Stirparo P., A permission verification approach for Android mobile applications, Computers & Security, vol. 49, pp. 192–205, 2015.
[11]
Zhou Y., Wang Z., Zhou W., and Jiang X., Hey, You, Get off of my market: Detecting malicious apps in official and alternative Android markets, in Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS), 2012.
[12]
Grace M., Zhou Y., Zhang Q., Zou S., and Jiang X., Riskranker: Scalable and accurate zero-day Android malware detection, in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys), 2012, pp. 281–294.
[13]
Rastogi V., Chen Y., and Jiang X., Droidchameleon: Evaluating Android anti-malware against transformation attacks, in Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIA CCS), 2013, pp. 329–334.
[14]
Grace M. C., Zhou W., Jiang X., and Sadeghi A.-R., Unsafe exposure analysis of mobile in-app advertisements, in Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2012, pp. 101–112.
[15]
Poeplau S., Fratantonio Y., Bianchi A., Kruegel C., and Vigna G., Execute this! Analyzing unsafe and malicious dynamic code loading in Android applications, in Proceedings of the 21th Annual Symposium on Network and Distributed System Security (NDSS), 2014.
[16]
Zhou Y. and Jiang X., Dissecting Android malware: Characterization and evolution, in Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland), 2012, pp. 95–109.
[17]
Barrera D., Kayacik H. G., van Oorschot P. C., and Somayaji A., A methodology for empirical analysis of permission-based security models and its application to Android, in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 2010, pp. 73–84.
[18]
Aafer Y., Du W., and Yin H., Droidapiminer: Mining api-level features for robust malware detection in Android, in Proceedinds of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm), 2013, pp. 86–103.
[19]
Arp D., Spreitzenbarth M., Hbner M., Gascon H., Rieck K., and Siemens C., Drebin: Effective and explainable detection of Android malware in your pocket, in Proceedings of the 21th Annual Symposium on Network and Distributed System Security (NDSS), 2014.
[20]
Zhang M., Duan Y., Yin H., and Zhao Z., Semantics-aware Android malware classification using weighted contextual api dependency graphs, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014, pp. 1105–1116.
[21]
Burguera I., Zurutuza U., and Nadjm-Tehrani S., Crowdroid: Behavior-based malware detection system for Android, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 15–26.
[22]
Bengio Y., Learning deep architectures for ai, Foundations and Trends in Machine Learning, vol. 2, no. 1, pp. 1–127, 2009.
[23]
Yuan Z., Lu Y., Wang Z., and Xue Y., Droid-sec: Deep learning in Android malware detection, in Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication (SIGCOMM, poster), 2014, pp. 371–372.
[28]
Enck W., Gilbert P., Chun B.-G., Cox L. P., Jung J., McDaniel P., and Sheth A., Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones, in Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
[30]
Friedman J. H. and Fisher N. I., Bump hunting in high-dimensional data, Statistics and Computing, vol. 9, no. 2, pp. 123–143, 1999.
[31]
Jones N., The learning machines, Nature, vol. 505, pp. 146–148, 2014.
[32]
Wei X., Gomez L., Neamtiu I., and Faloutsos M., Profiledroid: Multi-layer profiling of Android applications, in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom), 2012, pp. 137–148.
[33]
Yan L.-K. and Yin H., Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis, in Proceedings of the 21st USENIX Security Symposium (USENIX Security), 2012, pp. 569–584.
[34]
Elish K. O., Shu X., Yao D. D., Ryder B. G., and Jiang X., Profiling user-trigger dependence for Android malware detection, Computers & Security, vol. 49, pp. 255–273, 2015.