[1] 曹莹, 刘家辰, 苗启广, 等. AdaBoost恶意程序行为检测新算法 [J]. 西安电子科技大学学报, 2013, 40(6): 116-124.
Cao Ying, Liu Jiachen, Miao Qiguang, et al. Improved Behavior-based Malware Detection Algorithm with AdaBoost [J]. Journal of Xidian University, 2013, 40(6): 116-124.
[2] Natani P, Vidyarthi D. An Overview of Detection Techniques for Metamorphic Malware [C]//Proceedings of the International Conference on Intelligent Computing, Networking, and Informatics. Raipur: Springer India, 2013: 637-643.
[3] Santos I, Brezo F, Ugarte X, et al. Opcode Sequences as Representation of Executables for Data-mining-based Unknown Malware Detection [J]. Information Sciences, 2013, 231(1): 64-82.
[4] Zhao Z, Wang J, Bai J. Malware Detection Method Based on the Control-flow Construct Feature of Software [J]. IET Information Security, 2014, 8(1): 18-24.
[5] Bose A, Hu X, Shin K G, et al. Behavioral Detection of Malware on Mobile Handsets [C]//Proceedings of the 6th International Conference on Mobile Systems, Applications and Services. New York: ACM, 2008: 225-238.
[6] Schmidt D, Bye R, Schmidt G, et al. Static Analysis of Executables for Collaborative Malware Detection on Android [C]//Proceedings of the IEEE International Conference on Communications. Piscataway: IEEE, 2009: 1-5.
[7] Shabtai A, Fledel Y, Elovici Y. Automated Static Code Analysis for Classifying Android Applications Using Machine Learning [C]//Proceedings of the IEEE International Conference on Computational Intelligence and Security. Los Alamitos: IEEE, 2010: 329-333.
[8] Xie L, Zhang X W, Seifert P, et al. PBMDS: a Behavior-based Malware Detection System for Cellphone Devices [C]//Proceedings of the Third ACM Conference on Wireless Network Security. New York: ACM, 2010: 37-48.
[9] Burguera I, Zurutuza U, Nadjm-Tehrani S. Crowdroid: Behavior-based Malware Detection System for Android [C]//Proceedings of the 1st ACM Workshop: Security and Privacy in Smartphones and Mobile Devices. New York: ACM, 2011: 15-25.
[10] Google. Android Official Market [DB/OL]. [2014-02-27]. https://play.google.com/store.
[11] Torvalds L. Linux System Call Table [EB/OL]. [2014-02-27]. http://osinside.net/syscall/system_call_table.htm.
[12] Kranenburg P, Levin D. Strace [CP/OL]. [2014-02-27]. http://sourceforge.net/projects/strace.
[13] Cesare S, Xiang Y. Classification of Malware Using Structured Control Flow [C]//Proceedings of the 8th Australasian Symposium on Parallel and Distributed Computing. Brisbane: Australian Computer Society, 2010: 61-70.
[14] Apel M, Bockermann C, Meier M. Measuring Similarity of Malware Behavior [C]//Proceedings of the 34th Conference on Local Computer Networks. Los Alamitos: IEEE Computer Society, 2009:891-898.
[15] Cilibrasi R, Vitanyi B. Clustering by Compression [J]. IEEE Transactions on Information Theory, 2005, 51(4): 1523-1545.
[16] Zhou Y, Jiang X. Android Malware Genome Project [EB/OL]. [2014-02-27]. http://www.malgenomeproject.org.
[17] Desnos A. Androguard Malware Database [DB/OL]. [2014-02-27]. https://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares.
[18] Parkour M. Contagiodump [EB/OL]. [2014-02-27]. http://contagiodump.blogspot.com. |