과제정보
연구 과제 주관 기관 : 한국연구재단
참고문헌
- Thurm, Scott, and Yukari Iwatani Kane, "Your apps are watching you," The Wall Street Journal 17, 2010.
- Anzhi android market, http://www.anzhi.com/
- KNN, http://en.wikipedia.org/wiki/K-nearest_neighbors_algorithm.
- Decision Tree, http://en.wikipedia.org/wiki/Decision_tree.
- Bayesian networks, http://en.wikipedia.org/wiki/Bayesian_network.
- Wu, Dong-Jie, et al., "Droidmat: Android malware detection through manifest and API calls tracing," Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on. IEEE, 2012.
- Androguard, https://code.google.com/p/androguard/.
- Sato, Ryo, Daiki Chiba, and Shigeki Goto, "Detecting Android Malware by Analyzing Manifest Files," Proceedings of the Asia-Pacific Advanced Network 36 (2013): 23-31.
- Fritz, Christian, et al., "Highly precise taint analysis for android applications," EC SPRIDE, TU Darmstadt, Tech. Rep (2013).
- Enck, William, et al., "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," OSDI, Vol. 10, 2010.
- Yang, Zhemin, and Min Yang, "Leakminer: Detect information leakage on android with static taint analysis," Software Engineering (WCSE), 2012 Third World Congress on, IEEE, 2012.
- Kim, Seil, et al., "A study on static analysis model of mobile application for privacy protection," Computer Science and Convergence, Springer Netherlands, pp. 529-540, 2012.
- Enck, William, Machigar Ongtang, and Patrick McDaniel, "On lightweight mobile phone application certification," Proceedings of the 16th ACM conference on Computer and communications security, ACM, 2009.
- Zhou, Yajin, et al., "Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets," Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012.
- Barrera, David, et al., "A methodology for empirical analysis of permission-based security models and its application to android," Proceedings of the 17th ACM conference on Computer and communications security, ACM, 2010.
- Dijkstra's algorithm, http://en.wikipedia.org/wiki/Dijkstra's_algorithm
- contagio, http://contagiominidump.blogspot.kr/
- VirusTotal, https://www.virustotal.com/