安卓恶意软件分析文献梳理2017-Android Malware Analysis-wcventure

Android Analysis

This document collects papers that are related with android analysis.

Android Malware

【Benchmark&dataset】

  • J Mitra, VP Ranganath.Ghera: A Repository of Android App Vulnerability Benchmarks. 2017. paper, resources
    Conference: International Conference on Predictive Models and Data Analytics in Software Engineering, At Toronto, Canada
    tips: Vulnerability Benchmarks,span 4 areas of Android framework:Inter Component Communication(ICC)、Storage、System、Web.

  • Jiang X, Zhou Y. Dissecting Android Malware: Characterization and Evolution[C]// IEEE Symposium on Security and Privacy. IEEE Computer Society, 2012:95-109. paper,resources
    tips: including 1260 malwares,but can’t get them,because the authors stop the sharing

  • Drebin

  • Marvin

【Machine Learning】

2017

  • Deep Android Malware Detection [C]. [paper][code]
    Mclaughlin N, Rincon J M D, Kang B J, et al.
    ACM on Conference on Data and Application Security and Privacy. ACM, 2017:301-308.
    tips: opcode、CNN

  • Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps[C] [paper],
    Pan X, Wang X, Duan Y, et al.
    Network and Distributed System Security Symposium. 2017.
    tips: HSO、SVM

    • A Survey on Malware Detection Using Data Mining Techniques[J]. [paper]
      Ye Y, Li T, Adjeroh D, et al.
      Acm Computing Surveys, 2017, 50(3):41
      tips: about PE files

    • Transcend: Detecting Concept Drift in Malware Classification Models[paper]
      Roberto Jordaney, Kumar Sharad, Santanu Kumar Dash , Zhi Wang , Davide Papini ,Ilia Nouretdinov, and Lorenzo Cavallaro
      USENIX Security 2017
      tips: concept drift

    • Suarez-Tangil G, Dash S K, Ahmadi M, et al. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware[C]// Conference on Data and Application Security and Privacy. 2017. [paper]
      tips: obfuscated,extra trees

2015

  • Mobile malware detection using op-code frequency histograms[C] [paper]
    Canfora G, Mercaldo F, Visaggio C A.
    International Joint Conference on E-Business and Telecommunications. IEEE, 2015.
    tips: opcode、J48,LadTree, NBTree, RandomForest, RandomTree and RepTree.

2014

  • DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket [paper]
    Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck
    NDSS: Network and Distributed System Security Symposium. 2014.
    *tips:*from the manifest:Hardware components,Requested permissions,App components,Filtered intents.
    from disassembled code: Restricted API calls,Used permissions,Suspicious API calls,Network addresses;SVM

2013

  • A New Android Malware Detection Approach Using Bayesian Classification[C] [paper]
    Yerima S Y, Sezer S, Mcwilliams G, et al.
    IEEE, International Conference on Advanced Information NETWORKING and Applications. IEEE Computer Society, 2013:121-128.
    tips: API call、system commands、permissions, Bayesian ,MI

【Static Analysis】

2017

  • When Program Analysis Meets Mobile Security: An Industrial Study of Misusing Android Internet Sockets. [paper]
  • Automatic Generation of Inter-Component Communication Exploits for Android Applications.[paper]
  • Mining Mobile App Markets for Prioritization of Security Assessment Effort.paper

2011

【Dynamic Analysis】

  • Writing tests
  • Code review
  • Other guidelines

【 Hybird Analysis】

  • Repo owner or admin
  • Other community or team contact
发布了18 篇原创文章 · 获赞 23 · 访问量 1万+

猜你喜欢

转载自blog.csdn.net/wcventure/article/details/79122294