[1] BISSION D.Beware! this Android banking Trojan intercepts SMS messages and bypasses 2SV[EB/OL].[2019-05-10].https://www.grahamcluley.com/android-banking-trojan-intercept-sms-messages/. [2] LAURA G,RODRÍGUEZ R J.A peek under the Hood of iOS malware[C]//Proceedings of the 11th International Conference on Availability,Reliability and Security.Washington D.C.,USA:IEEE Press,2016:1-5. [3] CHUAN B L J,MANMEET M S,AZIZUL R M S.APTGuard:Advanced Persistent Threat(APT) detections and predictions using Android smartphone[M]//ALFRED R,LIM Y,IBRAHIM A A A,et al.Computational science and technology.Berlin,Germany:Springer,2019:545-555. [4] BALAG D,CHAKRABARTI A,MIDHUNCHAKK A D.Smart devices threats,vulnerabilities and malware detection approaches:a survey[J].European Journal of Engineering Research and Science,2018,3(2):7-12. [5] LUO Junzhou,YANG Ming,LING Zhen,et al.Architecture and key technologies of cyberspace security[J].Science in China:Information Sciences,2016,46(8):939-968.(in Chinese)罗军舟,杨明,凌振,等.网络空间安全体系与关键技术[J].中国科学:信息科学,2016,46(8):939-968. [6] XU Yanping,MA Zhaofeng,WANG Zhonghua,et al.Survey of security for Android smart terminal[J].Journal on Communications,2016,37(6):169-174.(in Chinese)许艳萍,马兆丰,王中华,等.Android智能终端安全综述[J].通信学报,2016,37(6):169-174. [7] REN J,RAO A,LINDORFER M,et al.ReCon:revealing and controlling PII leaks in mobile network traffic[C]//Proceedings of the 14th Annual International Conference on Mobile Systems,Applications,and Services.New York,USA:ACM Press,2016:1-5. [8] CHEN Zhenxiang,HAN Hongbo,YAN Qiben,et al.A first look at Android malware traffic in first few minutes[C]//Proceedings of IEEE Trustcom/BigDataSE/ISPA.Washington D.C.,USA:IEEE Press,2015:206-213. [9] ARSHAD S,SHAH M A,KHAN A,et al.Android malware detection & protection:a survey[J].International Journal of Advanced Computer Science and Applications,2016,7(2):463-475. [10] CHEN P S,LIN S C,SUN C H.Simple and effective method for detecting abnormal Internet behaviors of mobile devices[J].Information Sciences,2015,321:193-204. [11] SHABTAI A,TENENBOIM-CHEKINA L,MIMRAN D,et al.Mobile malware detection through analysis of deviations in application network behavior[J].Computers & Security,2014,43:1-18. [12] HE Gaofeng,XU Bingfeng,ZHU Haiting.AppFA:a novel approach to detect malicious Android applications on the network[J].Security and Communication Networks,2018,2018:1-15. [13] WU D J,MAO C H,WEI T E,et al.Droidmat:Android malware detection through manifest and API calls tracing[C]//Proceedings of 2012 Asia Joint Conference on Information Security.Washington D.C.,USA:IEEE Press,2012:1-5. [14] ZHU Zhangying,MA Yong,YAN Jinhua,et al.Malicious mobile application identification based on end-user comment[J].Communications Technology,2019,52(2):449-454.(in Chinese)朱璋颖,马永,燕锦华,等.基于评论数据的恶意移动应用检测方法[J].通信技术,2019,52(2):449-454. [15] WANG Qianwen.Research on dynamic monitoring method of Android malware[D].Nanjing:Nanjing University of Posts and Telecommunications,2018.(in Chinese)王倩文.安卓系统恶意软件动态监测方法的研究[D].南京:南京邮电大学,2018. [16] SARACINO A,SGANDURRA D,DINI G,et al.Madam:effective and efficient behavior-based android malware detection and prevention[J].IEEE Transactions on Dependable and Secure Computing,2018,15(1):83-97. [17] ARESU M,ARIU D,AHMADI M,et al.Clustering Android malware families by http traffic[C]//Proceedings of the 10th International Conference on Malicious and Unwanted Software.Washington D.C.,USA:IEEE Press,2015:1-6. [18] MALIK J,KAUSHAL R.CREDROID:Android malware detection by network traffic analysis[C]//Proceedings of the 1st ACM Workshop on Privacy-aware Mobile Computing.New York,USA:ACM Press,2016:1-10. [19] ARORA A,GARG S,PEDDOJU S K.Malware detection using network traffic analysis in Android based mobile devices[C]//Proceedings of 2014 International Conference on Next Generation Mobile Apps,Services and Technologies.Washington D.C.,USA:IEEE Press,2014:1-5. [20] LI L,LI D Y,BISSYANDÉ T F,et al.Understanding Android app piggybacking:a systematic study of malicious code grafting[J].IEEE Transactions on Information Forensics and Security,2017,12(6):1269-1284. [21] SONG Wenna,PENG Guojun,FU Jianming,et al.Research on malicious code evolution and traceability technology[J].Journal of Software,2019,30(8):2229-2267.(in Chinese)宋文纳,彭国军,傅建明,等.恶意代码演化与溯源技术研究[J].软件学报,2019,30(8):2229-2267. [22] HE Gaofeng,ZHANG Lu,XU Bingfeng.Detecting repackaged Android malware based on mobile edge computing[C]//Proceedings of 2018 IEEE International Conference on Advanced Cloud and Big Data.Washington D.C.,USA:IEEE Press,2018:1-8. [23] GAMA J,ŽLIOBAIT I,BIFET A,et al.A survey on concept drift adaptation[J].ACM Computing Surveys,2014,46(4):1-44. [24] ZHAUNIAROVICH Y,KHALIL I,YU T,et al.A survey on malicious domains detection through DNS data analysis[J].ACM Computing Surveys,2018,51(4):67-68. [25] SCHOMP K,RABINOVICH M,ALLMAN M.Towards a model of DNS client behavior[C]//Proceedings of International Conference on Passive and Active Network Measurement.Berlin,Germany:Springer,2016:1-8. [26] HE Gaofeng,XU Bingfeng,ZHANG Lu,et al.Mobile app identification for encrypted network flows by traffic correlation[J].International Journal of Distributed Sensor Networks,2018,14(12):1-17. [27] ALLIX K,BISSYANDÉ T F,KLEIN J,et al.Androzoo:collecting millions of Android apps for the research community[C]//Proceedings of 2016 IEEE/ACM Working Conference on Mining Software Repositories.Washington D.C.,USA:IEEE Press,2016:1-10. [28] LI Yuanchun,YANG Ziyue,GUO Yao,et al.DroidBot:a lightweight UI-guided test input generator for Android[C]//Proceedings of 2017 IEEE/ACM International Conference on Software Engineering Companion.Washington D.C.,USA:IEEE Press,2017:1-5. |