1 |
S. Kumar, R. Shanker, and S. Verma, "Context aware dynamic permission model: A retrospect of privacy and security in android system," in Proceedings - 2nd International Conference on Intelligent Circuits and Systems, ICICS 2018, 2018, pp. 330-333.
|
2 |
A. Bhattacharya and R. T. Goswami, "A Hybrid Community Based Rough Set Feature Selection Technique in Android Malware Detection," in Smart Trends in Systems, Security and Sustainability., 2018, no. 18, pp. 249-258.
|
3 |
M. Hammad, H. Bagheri, and S. Malek, "DELDROID: An automated approach for determination and enforcement of least-privilege architecture in android," J. Syst. Softw., vol. 149, pp. 83-100, 2019.
DOI
|
4 |
A. Sadeghi, R. Jabbarvand, N. Ghorbani, H. Bagheri, and S. Malek, "A temporal permission analysis and enforcement framework for Android," in Proceedings of the 40th International Conference on Software Engineering - ICSE '18, 2018, pp. 846-857.
|
5 |
M. Yusof, M. M. Saudi, and F. Ridzuan, "A new mobile botnet classification based on permission and API calls," in Proceedings - 2017 7th International Conference on Emerging Security Technologies, EST 2017, 2017, pp. 122-127.
|
6 |
A. Talha and I. Alper, "An in-depth analysis of Android malware using hybrid techniques," Digit. Investig., vol. 24, pp. 25-33, 2018.
DOI
|
7 |
C. Wang and Y. Lan, "PFESG : Permission-based Android Malware Feature Extraction Algorithm," in ICNCC 2017: Proceedings of the 2017 VI International Conference on Network, Communication and Computing, 2017, pp. 106-109.
|
8 |
J. Cai, J. Luo, S. Wang, and S. Yang, "Feature selection in machine learning: A new perspective," Neurocomputing, vol. 300, pp. 70-79, 2018.
DOI
|
9 |
StatCounter, "Mobile Operating System Market Share Worldwide," StatCounter, 2021. .
|
10 |
Z. Abdullah and M. M. Saudi, "RAPID-Risk Assessment of Android Permission and Application Programming Interface ( API ) Call for Android Botnet," no. October, 2018.
|
11 |
R. Chang et al., "Towards a multilayered permissionbased access control for extending Android security," Concurr. Comput., vol. 30, no. 5, 2018.
|
12 |
H. Shahriar and M. Islam, "Android Malware Detection Using Permission Analysis," IEEE Conf. Proc., vol. 2017, no. SoutheastCon, pp. 1-6, 2017.
|
13 |
R. Kumar, X. Zhang, R. Khan, and A. Sharif, "Research on Data Mining of Permission-Induced Risk for Android IoT Devices," Appl. Sci., vol. 9, no. 2, p. 277, 2019.
DOI
|
14 |
W. Y. Lee, J. Saxe, and R. Harang, "SeqDroid: Obfuscated android malware detection using stacked convolutional and recurrent neural networks," Adv. Sci. Technol. Secur. Appl., pp. 197-210, 2019.
|
15 |
M. Fan, J. Liu, W. Wang, H. Li, Z. Tian, and T. Liu, "DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis," IEEE Trans. Inf. Forensics Secur., vol. 12, no. 8, pp. 1772-1785, 2017.
DOI
|
16 |
F. I. Abro, M. Rajarajana, and T. Chen, "Mobile Malware detection with permissions and intents analysis," p. 2014, 2014.
|
17 |
W. J. Buchanan, S. Chiale, and R. Macfarlane, "A methodology for the security evaluation within third-party Android Marketplaces," Digit. Investig., vol. 23, pp. 88-98, 2017.
DOI
|
18 |
F. Martinelli, F. Mercaldo, V. Nardone, A. Santone, and C. A. Visaggio, "Identifying mobile repackaged applications through formal methods," ICISSP 2017 - Proc. 3rd Int. Conf. Inf. Syst. Secur. Priv., vol. 2017-Janua, no. Icissp, pp. 673-682, 2017.
|
19 |
F. M. Faqiry, "Scrutinizing Permission Based Attack on Android Os Platform Devices," Int. J. Adv. Res. Comput. Sci., vol. 8, no. 7, pp. 421-426, 2017.
DOI
|
20 |
A. K. Chakravarty and S. Paul, "A study of signaturebased and behaviour-based malware detection approaches," Int. J. Adv. Res. Ideas Innov. Technol. ISSN, vol. 5, no. 3, pp. 1509-1511, 2019.
|
21 |
E. M. Karabulut, S. A. Ozel, and T. Ibrikci, "A comparative study on the effect of feature selection on classification accuracy," Procedia Technol., vol. 1, pp. 323-327, 2012.
DOI
|
22 |
H. Bagheri, E. Kang, S. Malek, and D. Jackson, "A formal approach for detection of security flaws in the android permission system," Form. Asp. Comput., vol. 30, no. 5, pp. 525-544, 2018.
DOI
|
23 |
B. F. Demissie, M. Ceccato, and L. K. Shar, "Security analysis of permission re-delegation vulnerabilities in Android apps," Empir. Softw. Eng., vol. 25, no. 6, pp. 5084-5136, 2020.
DOI
|
24 |
M. W. Afridi, T. Ali, T. Alghamdi, T. Ali, and M. Yasar, "Android application behavioral analysis through intent monitoring," in International Symposium on Digital Forensic and Security, ISDFS 2018, 2018, vol. 6, pp. 1-8.
|
25 |
A. Feizollah, N. B. Anuar, R. Salleh, G. Suarez-Tangil, and S. Furnell, "AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection," Comput. Secur., vol. 65, no., pp. 121-134, 2017.
DOI
|
26 |
A. Sharma and S. Dey, "Performance Investigation of Feature Selection Methods and Sentiment Lexicons for Sentiment Analysis," Int. J. Comput. Appl., no. June, pp. 15-20, 2012.
|
27 |
R. Kaur and M. Sachdeva, "Study and Comparison of Feature Selection Approaches for Intrusion Detection," in Proceedings on International Conference on Advances in Emerging Technology, 2016, vol. 2, pp. 1-7.
|
28 |
X. Liu and J. Liu, "A two-layered permission-based android malware detection scheme," Proc. - 2nd IEEE Int. Conf. Mob. Cloud Comput. Serv. Eng. MobileCloud, pp. 142-148, 2014.
|
29 |
S. Kandukuru and R. M. Sharma, "Android malicious application detection using permission vector and network traffic analysis," 2017 2nd Int. Conf. Converg. Technol. I2CT 2017, vol. 2017-Janua, pp. 1126-1132, 2017.
|
30 |
J. Duarte, "A Survey of Android Attacks Detection Techniques," in Digital Privacy and Security Conference (DPSC), 2020, no. February, pp. 106-117.
|
31 |
M. K. Alzaylaee, S. Y. Yerima, and S. Sezer, "Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation," in International Conference On Cyber Security And Protection Of Digital Services, 2017, pp. 1-8.
|
32 |
C. Chen, J. Lin, and G.-H. Lai, "Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code," in International Conference on Trustworthy Systems and their Applications Detecting, 2014, pp. 1-6.
|
33 |
C. La, P. Myo, and K. M. Myo, "Permission-based Feature Selection for Android Malware Detection and Analysis," Int. J. Comput. Appl., vol. 181, no. 19, pp. 29-39, 2018.
DOI
|
34 |
W. Wang, Z. Gao, M. Zhao, Y. Li, J. Liu, and X. Zhang, "DroidEnsemble: Detecting Android Malicious Applications with Ensemble of String and Structural Static Features," IEEE Access, vol. 6, no. c, pp. 31798-31807, 2018.
DOI
|
35 |
G. Kirubavathi and R. Anitha, "Structural analysis and detection of android botnets using machine learning techniques," Int. J. Inf. Secur., vol. 17, no. 2, pp. 153-167, 2018.
DOI
|
36 |
P. Feng, J. MA, C. SUN, X. XU1, and Y. MA, "A Novel Dynamic Android Malware Detection System With Ensemble Learning," IEEE Trans. JOURNALS, vol. 4, no. c, 2018.
|
37 |
V. Kouliaridis, G. Kambourakis, D. Geneiatakis, and N. Potha, "Two anatomists are better than one-Dual-level android malware detection," Symmetry (Basel)., vol. 12, no. 7, pp. 1-21, 2020.
|
38 |
M. Al Ali, D. Svetinovic, Z. Aung, and S. Lukman, "Malware Detection in Android Mobile Platform using Machine Learning Algorithms," in International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017, pp. 4-9.
|
39 |
P. Yan and Z. Yan, "A survey on dynamic mobile malware detection," Softw. Qual. J., vol. 26, no. 3, pp. 1-31, 2017.
|
40 |
D. O. Sahin, O. E. Kural, S. Akleylek, and E. Kilic, "A novel permission-based Android malware detection system using feature selection based on linear regression," Neural Comput. Appl., vol. 1, p. 5875, 2021.
|
41 |
J. Xiao, S. Chen, Q. He, Z. Feng, and X. Xue, "An Android application risk evaluation framework based on minimum permission set identification," J. Syst. Softw., vol. 163, p. 110533, 2020.
DOI
|
42 |
L. Shi, J. Fu, Z. Guo, and J. Ming, "'Jekyll and hyde' is risky: Shared-everything threat mitigation in dual-instance apps*," in MobiSys 2019 - Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, 2019, pp. 225-235.
|
43 |
P. Wijesekera, A. Baokar, L. Tsai, and J. Reardon, "The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences," Proc. - IEEE Symp. Secur. Priv., pp. 1077-1093, 2017.
|