A Scheme for Identifying Malicious Applications Based on API Characteristics |
Cho, Taejoo
(Soongsil University)
Kim, Hyunki (Soongsil University) Lee, Junghwan (Soongsil University) Jung, Moongyu (Samsung Electronics) Yi, Jeong Hyun (Soongsil University) |
1 | Anubis, https://anubis.iseclab.org/ |
2 | Virus Bulletin, http://www.virusbtn.com/resources/glossary/malware.xml |
3 | W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A Study of Android Application Security," Proceedings of the 20th USENIX conference on Security, p.21-21, Aug. 2011. |
4 | J. H. Jung, J. Y. Kim, H. C. Lee, and J. H. Yi, "Repackaging Attack on Android Banking Applications and Its Countermeasures," Journal of Wireless Personal Communications, vol.73, pp. 1421-1437, June 2013. DOI |
5 | T. J. Cho, G. B. Na, D. G. Lee, and J. H. Yi "Account Forgery and Privilege Escalation Attacks on Android Home Cloud Devices," Advanced Science Letters, vol. 21, pp. 381-386, Mar. 2015. DOI |
6 | DEX File Format, http://source.android.com/devices/tech/dalvik/dex-format. html |
7 | C. Collberg and J. Nagra. "Surreptitious Software: Obfuscation, Watermarking, and Tamper Proofing for Software Protection," Addison Wesley Professional, 2009. |
8 | C .Collberg, C.Thomborson, and D.Low, "A Taxonomy of Obfuscating Transformations," Technical report 148, Department of computer science, the University of Auckland, Auckland, New Zealand, 1997. |
9 | F. Zhang, H. Huang, S, Zhu, D. Wu, and P. Liu, "ViewDroid: towards obfuscation- resilient mobile application repackaging detection," Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, pp.25-36, July 2014. |
10 | Android API Reference, http://developer.android.com/reference/ |
11 | A. McCallum and K. Nigam, "A comparison of event models for naive bayes text classification," AAAI-98 Workshop on Learning for Text Categorization, Vol. 752, pp. 41-48, 1998. |
12 | D. Pavlov, R. Balasubramanyan, S. Kapur, and J. Parikh, "Document preprocessing for naive Bayes classification and clustering with mixture of multinomials," Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.829-834, Aug. 2004. |
13 | ASMDEX, http://asm.ow2.org/asmdex-index.html |
14 | Bytecode, http://source.android.com/devices/tech/dalvik/dalvik-bytecode.html |
15 | Contagio, http://contagiominidump.blogspot.kr/ |
16 | VirusShare, http://virusshare.com/ |
17 | Apktool, http://ibotpeaches.github.io/Apktool/ |