参考文献
[1]360互联网安全中心.2015年第三季度中国手机安全状况报告[EB/OL].(2015-10-22).http://zt.360.cn/1101061855.php?dtid=1101061451&did=1101460794.
[2]ZHOU Yajin,JIANG Xuxian.Dissecting Android Malware:Characterization and Evolution[C]//Proceedings of 2012 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2012:95-109.
[3]HANNA S,HUANG Ling,WU E,et al.Juxtapp:A Scalable System for Detecting Code Reuse Among Android Appl-ications[M]//FLEGEL U,MARKATOS E,ROBERTSON W.Detection of Intrusions and Malware,and Vulnerability Assessment.Berlin,Germany:Springer,2013:62-81.
[4]MYLES G,COLLBERG C.K-gram Based Software Birthmarks[C]//Proceedings of 2005 ACM Symposium on Applied Computing.New York,USA:ACM Press,2005:314-318.
[5]JANG J,BRUMLEY D,VENKATARAMAN S.BitShred:Feature Hashing Malware for Scalable Triage and Semantic Analysis[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2011:309-320.
[6]SUN Xin,ZHONGYANG Yibing,XIN Zhi,et al.Detecting Code Reuse in Android Applications Using Component-based Control Flow Graph[C]//Pro-ceedings of 2014 IFIP International Information Security Conference.Berlin,Germany:Springer,2014:142-155.
(下转第139页)
(上接第127页)
[7]ZHANG Fangfang,HUANG Heqing,ZHU Sencun,et al.ViewDroid:Towards Obfuscation-resilient Mobile Applica-tion Repackaging Detection[C]//Proceedings of 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks.New York,USA:ACM Press,2014:25-36.
[8]CRUSSELL J,GIBLER C,CHEN Hao.Attack of the Clones:Detecting Cloned Applications on Android Markets[M]//FORESTI S,YUNG M,MARTINELLI F.Computer Security-ESORICS 2012.Berlin,Germany:Springer,2012:37-54.
[9]MILO R,SHENORR S,ITZKOVITZ S,et al.Network Motifs:Simple Building Blocks of Complex Networks[J].Science,2002,298(5594):824-827.
[10]VALVERDE S,SOL R V.Network Motifs in Com-putational Graphs:A Case Study in Software Architecture[J].Physical Review E,2005,72(2).
[11]杨广亮,龚晓锐,姚刚,等.一个面向Android的隐私泄露检测系统[J].计算机工程,2012,38(23):1-6.
[12]陈凯,王鹏,LEE Y,等.面向海量软件的未知恶意代码检测方法[J].信息安全学报,2016,1(1):24-38.
[13]ZHOU Wu,ZHOU Yajin,JIANG Xuxian,et al.Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces[C]//Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy.New York,USA:ACM Press,2012:317-326.
[14]AppBrain[EB/OL].[2016-06-01].http://www.appbrain.com/stats.
[15]NG Y Y,ZHOU Hucheng,JI Zhiyuan,et al.Which Android App Store Can Be Trusted in China?[C]//Proceedings of the 38th Annual Computer Software and Applications Conference.Washington D.C.,USA:IEEE Press,2014:509-518.
[16]吴雪平,张大方,苏欣,等.基于流量相似度的Android二次打包应用的检测技术研究[J].小型微型计算机系统,2015,36(5):954-958.
编辑金胡考 |