DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android, pp.86-103, 2013. ,
DOI : 10.1007/978-3-642-28166-2_11
A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected?, 2014 IEEE 38th Annual Computer Software and Applications Conference, pp.384-393, 2014. ,
DOI : 10.1109/COMPSAC.2014.61
Using GUI ripping for automated testing of Android applications, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pp.258-261, 2012. ,
DOI : 10.1145/2351676.2351717
The evolution of mobile malware, Computer Fraud & Security, vol.2014, issue.8, pp.201418-201438, 2014. ,
DOI : 10.1016/S1361-3723(14)70524-X
Instrumenting Android and Java Applications as Easy as abc, Fourth International Conference on Runtime Verification, pp.364-381, 2013. ,
DOI : 10.1007/978-3-642-40787-1_26
Flow- Droid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.259-269, 2014. ,
Targeted and Depth-first Exploration for Systematic Testing of Android Apps, OOP- SLA'13, 2013. ,
An Android Application Sandbox system for suspicious software detection, 2010 5th International Conference on Malicious and Unwanted Software, pp.55-62, 2010. ,
DOI : 10.1109/MALWARE.2010.5665792
2014 Half Year Security Report ,
Automated Test Input Generation for Android: Are We There Yet? (E), 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.2015 ,
DOI : 10.1109/ASE.2015.89
TaintDroid, 9th USENIX Symposium on Operating Systems Design and Implementation, pp.393-407, 2010. ,
DOI : 10.1145/2619091
Android Security: A Survey of Issues, Malware Penetration, and Defenses, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.998-1022, 2015. ,
DOI : 10.1109/COMST.2014.2386139
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications, pp.1402-4826, 2014. ,
RiskRanker, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.281-294, 2012. ,
DOI : 10.1145/2307636.2307663
ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014. ,
DOI : 10.1109/BADGERS.2014.7
Dynodroid: an input generation system for Android apps, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, p.224, 2013. ,
DOI : 10.1145/2491411.2491450
Enter Sandbox: Android Sandbox Comparison, 3rd IEEE Mobile Security Technologies Workshop, 2014. ,
Rage against the virtual machine, Proceedings of the Seventh European Workshop on System Security, EuroSec '14, pp.1-6, 2014. ,
DOI : 10.1145/2592791.2592796
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications, Proceedings 2014 Network and Distributed System Security Symposium, pp.23-26, 2014. ,
DOI : 10.14722/ndss.2014.23328
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks, IEEE Transactions on Information Forensics and Security, vol.9, issue.1, pp.99-108, 2014. ,
DOI : 10.1109/TIFS.2013.2290431
Asking for (and about) permissions used by Android apps, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.31-40, 2013. ,
DOI : 10.1109/MSR.2013.6624000
Evading android runtime analysis via sandbox detection, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.447-458, 2014. ,
DOI : 10.1145/2590296.2590325
SmartDroid, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.93-104, 2012. ,
DOI : 10.1145/2381934.2381950
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012. ,
DOI : 10.1109/SP.2012.16