[1] XU E,GUO G.Spyware disguises as Android applications on Google play[EB/OL].[2019-06-03].https://blog.trendmicro.com/trendlabs-security-intelligence/spyware-disg uises-as-android-applications-on-google-play. [2] HE Gaofeng,XU Bingfeng,ZHANG Lu.et al.Mobile app identification for encrypted network flows by traffic correlation [J].International Journal of Distributed Sensor Networks,2018,14(12): 1-17. [3] HE Gaofeng,XU Bingfeng,ZHU Haiting.AppFA:a novel approach to detect malicious Android applications on the network[J].Security and Communication Networks,2018,2018:1-15. [4] SHABTAI A,TENENBOIM-CHEKINA L,MIMRAN D,et al.Mobile malware detection through analysis of deviations in application network behavior[J].Computers & Security,2014,43:1-18. [5] GARG S,PEDDOJU S K,SARJE A K.Network-based detection of Android malicious apps[J].International Journal of Information Security,2017,16(4):385-400. [6] ZHOU L N,PAN S M,WANG J W,et al.Machine learning on big data:opportunities and challenges[J].Neurocomputing,2017,237:350-361. [7] LASHKARI A H,KADIR A F A,GONZALEZ H F,et al.Towards a network-based framework for Android malware detection and characterization[C]//Proceedings of the 15th Annual Conference on Privacy,Security and Trust.Washington D.C.,USA:IEEE Press,2017:233-239. [8] LI L,LI D Y,BISSYANDE T F,et al.Understanding Android app piggybacking:a systematic study of malicious code grafting[J].IEEE Transactions on Information Forensics and Security,2017,12(6):1269-1284. [9] CHEN P S,LIN S C,SUN C H.Simple and effective method for detecting abnormal internet behaviors of mobile devices[J].Information Sciences,2015,321:193-204. [10] ARORA A,GARG S,PEDDOJU S K.Malware detection using network traffic analysis in Android based mobile devices[C]//Proceedings of 2014 8th International Conference on Next Generation Mobile Apps,Services and Technologies.Oxford,UK:IEEE Press,2014:1-9. [11] SHABTAI A,TENENBOIM-CHEKINA L,MIMRAN D,et al.Mobile malware detection through analysis of deviations in application network behavior[J].Computers & Security,2014,43:1-18. [12] HE Gaofeng,XU Bingfeng,ZHU Haiting.AppFA:a novel approach to detect malicious android applications on the network[J].Security and Communication Networks,2018,2018:1-15. [13] HE Gaofeng,ZHANG Lu,XU Bingfeng,et al.Detecting repackaged Android malware based on mobile edge computing[C]//Proceedings of 2018 6th International Conference on Advanced Cloud and Big Data.Washington D.C.,USA:IEEE Computer Society,2018:360-365. [14] CHEN Lu,LIU Xing,CHEN Mu,et al.Scalable security evaluation model of mobile application based on graph[J].Computer Engineering,2018,44(5):78-82.(in Chinese) 陈璐,刘行,陈牧,等.基于图的可扩展移动应用安全评估模型[J].计算机工程,2018,44(5):78-82. [15] YANG Xinyu,XU Guoai.Construction method on mobile application security ecological chain[J].Journal of Software,2017,28(11):3058-3071.(in Chinese) 杨昕雨,徐国爱.移动应用安全生态链构建方法[J].软件学报,2017,28(11):3058-3071. [16] CAI Rongyan,WANG He,YAO Qigui,et al.Research on malicious mobile application detection based on domain name association[J].Computer Engineering,2020,46(5):174-180.(in Chinese) 蔡荣彦,王鹤,姚启桂,等.基于域名关联的恶意移动应用检测研究[J].计算机工程,2020,46(5):174-180. [17] SANGSTER B,O'CONNOR T J,COOK T,et al.Toward instrumenting network warfare competitions to generate labeled datasets[C]//Proceedings of the 2nd Conference on Cyber Security Experimentation and Test.San Diego,USA:USENIX Association,2009:1-6. [18] STEVANOVIC M,PEDERSEN J M,D’ALCONZO A,et al.On the ground truth problem of malicious DNS traffic analysis[J].Computers & Security,2015,55:142-158. [19] FRANC V,SOFKA M,BARTOS K.Learning detector of malicious network traffic from weak labels[C]//Proceedings of European Conference on Machine Learning and Knowledge Discovery in Databases.Berlin,Germany:Springer,2015:85-99. [20] ABRAHAM A,ANDRIATSIMANDEFITRA R,BRUNELAT A,et al.GroddDroid:a gorilla for triggering malicious behaviors[C]//Proceedings of the 10th International Conference on Malicious and Unwanted Software (MALWARE).Washington D.C.,USA:IEEE Press,2015:15-20. [21] WEI X T,WOLF M.A survey on HTTPS implementation by Android apps:issues and countermeasures[J].Applied Computing and Informatics,2017,13(2):101-117. [22] HE Gaofeng,ZHANG Tao,MA Yuanyuan,et al.A novel method to detect encrypted data exfiltration[C]//Proceedings of 2014 International Conference on Advanced Cloud and Big Data.Washington D.C.,USA:IEEE Press,2014:240-246. [23] OLIVAIN J,GOUBAULT-LARRECQ J.Detecting subverted cryptographic protocols by entropy checking[R/OL].(2006-06-13)[2019-05-08].http://www.lsv.fr/publis/RAPPORTS_LSV/PDF/rr-lsv-2006-13.pdf. [24] ANDERSON B,PAUL S,MCGREW D.Deciphering malware’s use of TLS (without decryption)[J].Journal of Computer Virology and Hacking Techniques,2018,14(3):195-211. [25] LIN Jingqiang,JING Jiwu,ZHANG Qionglu,et al.Recent advances in PKI technologies[J].Journal of Cryptologic Research,2015,2(6):487-496.(in Chinese)林璟锵,荆继武,张琼露,等.PKI技术的近年研究综述[J].密码学报,2015,2(6):487-496. [26] CHUNG H,PARK J,LEE S,et al.Digital forensic investigation of cloud storage services[J].Digital Investigation,2012,9(2):81-95. [27] AAFER Y,DU W L,YIN H.DroidAPIMiner: mining API-level features for robust malware detection in android[C]//Proceedings of International Conference on Security and Privacy in Communication Systems.Berlin,Germany:Springer,2013:86-103. [28] ALLIX K,BISSYANDE T F,KLEIN J,et al.AndroZoo:collecting millions of Android apps for the research community[C]//Proceedings of the 13th International Conference on Mining Software Repositories.Washington D.C.,USA:IEEE Press,2016:468-471. |