DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android, pp.86-103, 2013. ,
DOI : 10.1145/2133601.2133640
Tensorflow: A system for large-scale machine learning, pp.265-283, 2016. ,
Detecting Misuse of Google Cloud Messaging in Android Badware, Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM'16, pp.103-112, 2016. ,
DOI : 10.1145/2435349.2435377
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY '16, pp.183-194, 2016. ,
DOI : 10.1007/s11416-008-0082-4
URL : http://arxiv.org/pdf/1511.04317
Applying machine learning classifiers to dynamic Android malware detection at scale, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1666-1671, 2013. ,
DOI : 10.1109/IWCMC.2013.6583806
HelDroid: Dissecting and Detecting Mobile Ransomware, Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses, pp.382-404, 2015. ,
DOI : 10.1007/978-3-319-26362-5_18
Clustering android malware families by http traffic, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.128-135, 2015. ,
DOI : 10.1109/MALWARE.2015.7413693
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket, Proceedings 2014 Network and Distributed System Security Symposium, p.NDSS, 2014. ,
DOI : 10.14722/ndss.2014.23247
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.259-269, 2014. ,
Mining Apps for Abnormal Usage of Sensitive Data, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.426-436, 2015. ,
DOI : 10.1109/ICSE.2015.61
Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001. ,
DOI : 10.1023/A:1010933404324
Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.15-26, 2011. ,
DOI : 10.1145/2046614.2046619
Tensorforest: Scalable random forests on tensorflow, Machine Learning Systems Workshop at NIPS, 2016. ,
DroidScribe: Classifying Android Malware Based on Runtime Behavior, 2016 IEEE Security and Privacy Workshops (SPW), pp.252-261, 2016. ,
DOI : 10.1109/SPW.2016.25
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7527777
Do we need hundreds of classifiers to solve real world classification problems? Fortinet: Android locker malware uses google cloud messaging service, J. Mach. Learn. Res, vol.15, issue.20, pp.3133-3181, 2014. ,
Deep analysis of android rootnik malware using advanced anti-debug and anti-hook, pp.5-8, 2017. ,
On-Device Mobile Phone Security Exploits Machine Learning, IEEE Pervasive Computing, vol.16, issue.2, pp.92-96, 2017. ,
DOI : 10.1109/MPRV.2017.26
R-PackDroid, Proceedings of the Symposium on Applied Computing , SAC '17, 2017. ,
DOI : 10.1109/SP.2012.16
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models, Proceedings 2017 Network and Distributed System Security Symposium, 2017. ,
DOI : 10.14722/ndss.2017.23353
Charger malware calls and raises the risk on google play http://blog.checkpoint.com, Point, C.: Preinstalled malware targeting mobile users, 2017. ,
A whale of a tale: Hummingbad returns, 2017. ,
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software, IEEE Transactions on Software Engineering, vol.43, issue.6, pp.1-1, 2016. ,
DOI : 10.1109/TSE.2016.2615307
DroidSieve, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, pp.309-32017, 2017. ,
DOI : 10.1109/SP.2012.16
SecuRank, Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM'16, pp.43-52, 2016. ,
DOI : 10.1145/2508859.2516689
Effective Real-Time Android Application Auditing, 2015 IEEE Symposium on Security and Privacy, pp.899-914, 2015. ,
DOI : 10.1109/SP.2015.60
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7163067
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications, pp.163-182, 2014. ,
DOI : 10.1007/978-3-319-11203-9_10
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1105-1116, 2014. ,
DOI : 10.1145/2590296.2590312