De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining |
Su, Xin
(Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy)
Liu, Xuchong (Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy) Lin, Jiuchuang (Key Lab of Information Network Security, Ministry of Public Security) He, Shiming (School of Computer and Communication Engineering, Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha University of Science and Technology) Fu, Zhangjie (School of Computer and Software, Nanjing University of Information Science and Technology) Li, Wenjia (Department of Computer Sciences, New York Institute of Technology) |
1 | McAfee. http://www.mcafee.com, 2012. |
2 | Antonio Bianchi Christopher Kruegel Sebastian Poeplau, Yanick Fratantonio and Giovanni Vigna, "Execute this! analyzing unsafe and malicious dynamic code loading in android applications," in Proc. of Network & Distributed System Security Symposium, 1-16, 2014. |
3 | Malte Hubner Hugo Gascon Daniel Arp, Michael Spreitzenbarth and Konrad Rieck, "Drebin: Effective and explainable detection of android malware in your pocket," in Proc. of Network & Distributed System Security Symposium, 2014. |
4 | T.T.T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," Communications Surveys Tutorials, IEEE, 10(4):56-76, 2008. DOI |
5 | X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, "Profiledroid: Multilayer profiling of android applications," in Proc. of the 18th annual international conference on Mobile computing and networking, 11(1): 137-148, 2012. |
6 | C. Lever, M. Antonakakis, B. Reaves, P. Traynor, and W Lee, "The core of the matter: Analyzing malicious traffic in cellular carriers," in Proc. of Network & Distributed System Security Symposium, 2013. |
7 | N. Vallina-Rodriguez, J. Shah, A. Finamore, H. Haddadi, and et al., "Breaking for commercials: Characterizing mobile advertising," in Proc. of the 2012 Internet Measurement Conference, 343-356, 2012. |
8 | W. Cui, J. Kannan, and H. J. Wang, "Discoverer: automatic protocol reverse engineering from network traces," in Proc. of 16th USENIX Security Symposium on USENIX Security Symposium, 2007. |
9 | P. Royal, "Analysis of the kraken botnet," Technical report, Damballa Labs, 2008. |
10 | S. Hao, N. Feamster, and R. Pandrangi, "An internet wide view into dns lookup patterns," Technical report, Verisign Labs, 2010. |
11 | J. Jung, E. Sit, H. Balakrishnan, and R. Morris, "Dns performance and the effectiveness of caching," IEEE/ACM Trans. Netw., 10(5):589-603, 2002. DOI |
12 | Xin Su, Dafang Zhang, Wenjia Li, and Kai Zhao, "A Deep Learning Approach to Android Malware Feature Learning and Detection," in Proc .of Trustcom 2016: 244-251, 2016. |
13 | Xuezhi Wen, Ling Shao, Yu Xue, and Wei Fang, "A rapid learning algorithm for vehicle classification," Information Sciences, 295(1): 395-406, 2015. DOI |
14 | K. Zhao, D.F. Zhang, X. Su, and W.J. Li, "Fest: A feature extraction and selection tool for android malware detection," in Proc .of 2015 IEEE Symposium on Computers and Communication, 714-720, 2015. |
15 |
Bin Gu and Victor S. Sheng, "A Robust Regularization Path Algorithm for |
16 | Yuhui Zheng, Byeungwoo Jeon, Danhua Xu, Q.M. Jonathan Wu, and Hui Zhang, "Image segmentation by generalized hierarchical fuzzy C-means algorithm," Journal of Intelligent and Fuzzy Systems, 28(2): 961-973, 2015. |
17 |
Bin Gu, Victor S. Sheng, Zhijie Wang, Derek Ho, Said Osman, and Shuo Li, "Incremental learning for |
18 | Gu Bin, Victor S. Sheng, and Shuo Li, "Bi-parameter space partition for cost-sensitive SVM," in Proc. of the 24th International Conference on Artificial Intelligence, 3532-3539, 2015 |
19 | M. C. Grace, W. Zhou, X. Jiang, and A. Sadeghi, "Unsafe exposure analysis of mobile in-app advertisements," in Proc. of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, 101-112, 2012. |
20 | H. Haddadi, P. Hui, and L. Brown, "Mobiad: private and scalable mobile advertising," in Proc. of MobiArch, 2010. |
21 | AnserverBot. "Security alert: Anserverbot," new sophisticated android bot found in alternative android markets, 2012. |
22 | S. Guha, A. Reznichenko, K. Tang, H. Haddadi, and P. Francis, "Serving ads from localhost for performance, privacy, and profit," in Proc. of Hot Topics in Networking, 2009. |
23 | Monkeyrunner. http://developer.android.com/tools/help/monkeyrunnerconcepts.html, 2012. |
24 | Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," in Proc. of the 2012 IEEE Symposium on Security and Privacy, 95-109, 2012. |
25 | Zhangjie Fu, Xingming Sun, Qi Liu, Lu Zhou, and Jiangang Shu, "Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing," IEICE Transactions on Communications, E98-B(1): 190-200, 2015. DOI |
26 | A. Andoni and P. Indyk, "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions," Commun. ACM, 51(1):117-122, 2008. DOI |
27 | DroidKungFu, http://www.fortiguard.com/encyclopedia/virus/android droidkungfu.a!tr.html, 2012. |
28 | MDL. http://www.malwaredomainlist.com/mdl.php. |
29 | Weka. http://www.cs.waikato.ac.nz/ml/weka/. |
30 | Q. Xu, J. Erman, A. Gerber, Z.Q Mao, J. Pang, and S. Venkataraman, "Identifying diverse usage behaviors of smartphone apps," in Proc. of the 2011 ACM SIGCOMM conference on Internet measurement conference, 329-344, 2011. |
31 | Hierarchy Viewer. http://developer.android.com/tools/help/hierarchy-viewer.html, 2010. |
![]() |