A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010. ,
DOI : 10.1145/1866307.1866317
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications, 2011 6th International Conference on Malicious and Unwanted Software, pp.66-72, 2011. ,
DOI : 10.1109/MALWARE.2011.6112328
Rootkits on smart phones, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile '10, 2010. ,
DOI : 10.1145/1734583.1734596
Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.15-26, 2011. ,
DOI : 10.1145/2046614.2046619
Emerging security threats for mobile platforms, 2011. ,
A survey of mobile malware in the wild. SPSM'11, 2011. ,
RiskRanker, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.281-294, 2012. ,
DOI : 10.1145/2307636.2307663
Android SMS botnet, Proceedings of the 10th ACM international symposium on Mobility management and wireless access, MobiWac '12, pp.125-130, 2012. ,
DOI : 10.1145/2386995.2387016
Android botnets on the rise : Trends and characteristics, ISSA'12, pp.1-5, 2012. ,
Kernel-based Behavior Analysis for Android Malware Detection, 2011 Seventh International Conference on Computational Intelligence and Security, pp.1011-1015, 2011. ,
DOI : 10.1109/CIS.2011.226
An empirical study of the robustness of inter-component communication in android, Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), DSN '12, pp.1-12 ,
Modeling of internet usage in large mobile societies using self-organizing maps, ACM SIGMOBILE Mobile Computing and Communications Review, vol.14, issue.4, pp.13-15, 2010. ,
DOI : 10.1145/1942268.1942274
Droidscope : seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis, Proceedings of the 21st USENIX conference on Security symposium, Security'12, pp.29-29 ,
Detecting repackaged smartphone applications in third-party android marketplaces, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.317-326, 2012. ,
DOI : 10.1145/2133601.2133640
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.368.3979
Hey, you, get off of my market : Detecting malicious apps in official and alternative android markets, Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012), 2012. ,