The analysis of android malware behaviors

被引:0
|
作者
Department of Computer and Information Engineering, Huainan Normal University, Huainan, China [1 ]
机构
来源
Int. J. Secur. Appl. | / 3卷 / 335-346期
关键词
D O I
10.14257/ijseia.2015.9.3.26
中图分类号
学科分类号
摘要
18
引用
收藏
相关论文
共 50 条
  • [1] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345
  • [2] A detection model of malware behaviors on android
    Dong, Hang, 1600, Beijing University of Posts and Telecommunications (37):
  • [3] CopperDroid: Automatic Reconstruction of Android Malware Behaviors
    Tam, Kimberly
    Khan, Salahuddin J.
    Fattori, Aristide
    Cavallaro, Lorenzo
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [4] The Evolution of Android Malware and Android Analysis Techniques
    Tam, Kimberly
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Cavallaro, Lorenzo
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [5] Android Platform Malware Analysis
    Alfalqi, Khalid
    Alghamdi, Rubayyi
    Waqdan, Mofareh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 140 - 146
  • [6] Challenges in Android Malware Analysis
    Tong, Valerie Viet Triem
    Lalande, Jean Francois
    Leslous, Mourad
    ERCIM NEWS, 2016, (106): : 42 - +
  • [7] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56
  • [8] An Analysis of Android Malware Behavior
    Singh, Gagandeep
    Jaafar, Fehmi
    Zavarsky, Pavol
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 505 - 512
  • [9] Android malware analysis in a nutshell
    Almomani, Iman
    Ahmed, Mohanned
    El-Shafai, Walid
    PLOS ONE, 2022, 17 (07):
  • [10] A Comparative Analysis of Android Malware
    Chavan, Neeraj
    Di Troia, Fabio
    Stamp, Mark
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 664 - 673