Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.15-26, 2011. ,
DOI : 10.1145/2046614.2046619
Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis, Proceedings of the 21st USENIX conference on Security symposium, ser. Security'12, pp.29-29, 2012. ,
RiskRanker, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.281-294, 2012. ,
DOI : 10.1145/2307636.2307663
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012), 2012. ,
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011. ,
DOI : 10.1145/2046707.2046779
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.16
Emerging security threats for mobile platforms, 2011. ,
A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, 2011. ,
DOI : 10.1145/2046614.2046618
Rootkits on smart phones, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile '10, 2010. ,
DOI : 10.1145/1734583.1734596
URL : https://rucore.libraries.rutgers.edu/rutgers-lib/36725/PDF/1/
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications, 2011 6th International Conference on Malicious and Unwanted Software, 2011. ,
DOI : 10.1109/MALWARE.2011.6112328
Kernelbased behavior analysis for android malware detection, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security, ser. CIS '11, pp.1011-1015, 2011. ,
Detecting repackaged smartphone applications in third-party android marketplaces, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.317-326, 2012. ,
DOI : 10.1145/2133601.2133640
A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010. ,
DOI : 10.1145/1866307.1866317