[1]GRACE M,ZHOU Y,ZHANG Q,et al.RiskRanker:scalable and accurate zero-day Android malware detection[C]//Proceedings of International Conference on Mobile Systems,Applications,and Services.New York,USA:ACM Press,2012:281-294.
[2]FELT A P,CHIN E,HANNA S,et al.Android permissions demystified[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2011:627-638.
[3]ENCK W,ONGTANG M,MCDANIEL P.On light-weight mobile phone application certification[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:235-245.
[4]刘华煜.基于支持向量机的机器学习研究[D].黑龙江:大庆石油学院,2005.
[5]GASCON H,YAMAGUCHI F,ARP D,et al.Structural detection of Android malware using embedded call graphs[C]//Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security.New York,USA:ACM Press,2013:45-54.
[6]SANZ B,SANTOS I,UGARTE-PEDRERO X,et al.Anomaly detection using string analysis for Android malware detection[C]//Proceedings of SOCO’13.Berlin,Germany:Springer,2013:469-478.
[7]ENCK W,GILBERT P,CHUN B G,et al.TaintDroid:an information flow tracking system for real-time privacy monitoring on smartphones[J].Acm Transactions on Computer Systems,2010,32(2):1-29.
[8]BURGUERA I,ZURUTUZA U,NADJM-TEHRANI S.Crowdroid:behavior-based malware detection system for Android[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York,USA:ACM Press,2011:15-26.
[9]SHABTAI A,KANONOV U,ELOVICI Y,et al.“Andromaly”:a behavioral malware detection frame-work for Android devices[J].Journal of Intelligent Information Systems,2012,38(1):161-190.
[10]陈鸿,金培权,岳丽华,等.基于上下文特征分类的评论长句切分方法[J].计算机工程,2015,41(9):233-237,244.
[11]胡彬,王春东,胡思琦,等.基于机器学习的移动终端高级持续性威胁检测技术研究[J].计算机工程,2017,43(1):241-246.
[12]AU K W Y,ZHOU Y F,HUANG Z,et al.PScout:analyzing the Android permission specification[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2012:217-228.
[13]STEVEN A.Soot-infoflow-Android[EB/OL].[2017-06-30].https://github.com/secure-software-engineering/soot-infoflow-android/blob/develop/SourcesAndSinks.txt.
[14]VALLERAI R,CO P,GAGNON E,et al.Soot:a Java bytecode optimization framework[J].Masters Abstracts International,2010,41(1):214-224.
[15]MILTENBERGER M.Soot:a Java optimization frame-work[EB/OL].[2017-06-30].https://github.com/Sable/soot.
[16]STEVEN A.Android-specific components of FlowDroid[EB/OL].[2017-06-30].https://github.com/secure-software-engineering/soot-infoflow-android.
[17]范永东.模型选择中的交叉验证方法综述[D].太原:山西大学,2013. |