A String Analysis based System for Classifying Android Apps Accessing Harmful Sites |
Choi, Kwang-Hoon
(연세대학교 컴퓨터정보통신공학부)
Ko, Kwang-Man (지대학교 컴퓨터정보공학부) Park, Hee-Wan (한라대학교 정보통신방송공학부) Youn, Jong-Hee (강릉원주대학교 컴퓨터공학과) |
1 | Damien Octeau, William Enck, Patrick McDaniel, "The ded Decompiler," Technical Report NAS-TR-0140-2010, The Pennsylvania State University, September, 2010. |
2 | Smali: an Assembler/Disassembler for Android's dex format, http://code.google.com/p/smali/. |
3 | Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, and Kyung-Goo Doh, "A Practical String Analyzer by the Widening Approach," in Proceedings of the Fourth ASIAN Symposium on Programming Languages and Systems, LNCS, Vol.4279, pp.374-388, Springer, Sydney, Australia, 2006. |
4 | Kyung-Goo Doh, Hyunha Kim, and David A. Schmidt, "Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology," in Proceedings of the 16th International Symposium on Static Analysis, pp.256-272, Los Angeles, CA, August, 2009. |
5 | Vallee-Rai, Raja and Gagnon, Etienne and Hendren, Laurie J. and Lam, Patrick and Pominville, Patrice and Sundaresan, Vijay, "Optimizing Java Bytecode Using the Soot Framework: Is It Feasible?," in Proceedings of the 9th International Conference on Compiler Construction, pp.18-34, Springer, London, UK, 2000. |
6 | William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri, "A Study of Android Application Security," in Proceedings of the 20th USENIX Conference on Security, pp.21-21, USENIX Association, Berkeley, CA, USA, 2011. |
7 | Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Nikhilesh Reddy, Yixin Zhu, Jeffrey S. Foster, and Todd Millstein, "Dr. Android and Mr. Hide: Fine-grained Security Policies on Unmodified Android," Technical Report CS-TR-5006, Dept. of Computer Science, University of Maryland, College Park, 2011. |
8 | Wontae Sim, Jong-Myoung Kim, Jae-cheol Ryou, and Bongnam Noh, "Android Application Analysis Method for Malicious Activity Detection," Journal of the Korea Institute of Information Security and Cryptology, Vol.21, No.1, February, 2011. 과학기술학회마을 |
9 | Ministry of Gender Equality & Family, A Comprehensive Survey Report on Young People's Contact with Harmful Environment, November, 2011. |
10 | Deokgi Jung, Cutoff Apparatus for URL-based Harmful Site Access in LAN Environment and Method Thereof, Pub. No.KR10-2009-0031370, 2009. |
11 | Hangyeon Song and Misim Kim, System and Method for Blocking Harmfulness Equipped Blocking Application Against Harmful Website and Application, Pub. No.KR10-2010-0066841 2010. |
12 | Dalvik Technical Information, http://source.android.com/tech/dalvik/. |
13 | IETF, Uniform Resource Locators, RFC 1738. |
14 | Tools to work with android .dex and java .class files, http://code.google.com/p/dex2jar/. |
15 | Aske Simon Christensen, Anders Moller, and Michael I. Schwartzbach, "Precise Analysis of String Expressions," in Proceedings of 10th International Static Analysis Symposium (SAS), LNCS, Vol.2694, Springer-Verlag, June, 2003. |