共 44 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[4]
Deshotels L., 2014, Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014, P3, DOI [10.1145/2556464.2556467, DOI 10.1145/2556464.2556467]
[5]
Graph Embedding based Familial Analysis of Android Malware using Unsupervised Learning
[J].
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019),
2019,
:771-782
[6]
Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability
[J].
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017),
2017,
[7]
Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis
[J].
22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014),
2014,
:576-587
[9]
HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network
[J].
KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2017,
:1507-1515
[10]
Jordaney R, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P625