Acknowledgement
Supported by : 한국연구재단
References
- W. Enck, M. Ongtang, P. McDaniel, "Understanding android security," IEEE Security & Privacy Magazine, Vol. 7, No. 1, pp. 50-57, 2009. https://doi.org/10.1109/MSP.2009.26
- Google Play, https://play.google.com/store/apps
- Wei Xu, Fangfang Zhang, Sencun Zhu, "Permlyzer: Analyzing Permission Usage in Android Applications," 2013 IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 400-410, 2013.
- Karina Sokolova, Charles Perez, Marc Lemercier, "Android application classification and anomaly detection with graph-based permission patterns," Journal of Decision Support Systems, Vol. 93, No. C, pp. 62-76, 2017. https://doi.org/10.1016/j.dss.2016.09.006
- Detecting Polymorphic Malware, http://www.lavasoft.com/mylavasoft/securitycenter/whitepapers/detecting-polymorphic-malware.
- Margaret Rouse, "Polymorphic Malware," http://searchsecurity.techtarget.com/definition/polymorphic-malware.
- Ashu Sharma, S. K. Sahay, "Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey, International Journal of Computer Applications, Vol.90, No.2, pp.7-11, 2014. https://doi.org/10.5120/15544-4098
- Han Seong Lee, Hyung-Woo Lee, "Fake C&C Server for Evidence Aggregation and Detection of Server-Side Polymorphic Mobile Malware on Android Platform," Information, Vol.18, No.8, pp.3733-3737, 2015.
- Han Seong Lee, Hyung-Woo Lee, "Implementation of Polymorphic Malware DB based Dynamic Analysis Sysetm for Android Mobile Applications," Information, Vol.18, No.7, pp.3187-3197, 2015.
- You Joung Ham, Hyung-Woo Lee, "Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices," Journal of Internet Computing and Services, Vol.15, No.3, pp.31-43, 2014. https://doi.org/10.7472/jksii.2014.15.3.31
- Ming Xu, Lingfei Wu, Shushi Qi, Jian Xu, "A similarity metric method of obfuscated malware using function-call graph," Journal of Computer Virology and Hacking Techniques, Vol. 9, pp.35-47, 2013. https://doi.org/10.1007/s11416-012-0175-y
- Y. Zhong, H. Yamaki, H. Takakura, "A Malware Classification method Based on Similarity of Function Structure," 12th International Symposium of Applications and the Internet(SAINT), pp.256-261, 2012.
- Sushma Verma, Sunil Kumar Muttoo, S.K. Pal, "MDroid: Android based Malware Detection Using MCM Classifier," International Journal of Engineering Applied Sciences and Technology, Vol.1, No.8, pp. 206-215, 2016.
- You Jeong Ham, Daeyeol Moon, Hyung-Woo Lee, Jaedeok Lim, Jeong Nyeo Kim, "Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack", International Journal of Security and Its Applications(IJSIA), Vol.8, No.1, pp.231-246, 2014. https://doi.org/10.14257/ijsia.2014.8.1.22
- Virustotal, http://www.virustotal.com.
- dex file decompile, http://egloos.zum.com/shadowxx/v/10658242.
- Yajin Zhou, Xuxian Jiang, "Android Malware Genome Project," http://www.malgenomeproject.org, 2013.
- Sung-Hyun Yun, "The Mobile ID based Digital Signature Scheme Suitable for Mobile Contents Distribution", Journal of the Korea Convergence Society, Vol. 2. No. 1, pp. 1-6, 2011.
- Sik-Wan Cho, Won-Jun Jang, Hyung-Woo Lee, "mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone", Journal of the Korea Convergence Society, Vol. 3. No. 3, pp. 7-12, 2012.
- Myeong-Ho Lee, "A Study on N-Screen Convergence Application with Mobile WebApp Environment", Journal of the Korea Convergence Society, Vol. 6. No. 2, pp. 43-48, 2015. https://doi.org/10.15207/JKCS.2015.6.2.043