[1] TAM K, FEIZOLLAH A, ANUAR N B, et al. The evolution of Android malware and Android analysis techniques[J]. ACM Computing Surveys, 2017, 49(4):76. [2] 李挺, 董航, 袁春阳, 等. 基于Dalvik指令的Android恶意代码特征描述及验证[J]. 计算机研究与发展, 2014, 51(7):1458-1466.(LI T, DONG H, YUAN C Y, et al. Description of Android malware feature based on dalvik instructions[J]. Journal of Computer Research and Development, 2014, 51(7):1458-1466.) [3] 陈铁明, 杨益敏, 陈波. Maldetect:基于Dalvik指令抽象的Android恶意代码检测系统[J]. 计算机研究与发展, 2016, 53(10):2299-2306.(CHEN T M, YANG Y M, CHEN B. Maldetect:an Android malware detection system based on abstraction of dalvik instructions[J]. Journal of Computer Research and Development, 2016, 53(10):2299-2306.) [4] 胡文君, 赵双, 陶敬, 等. 一种针对Android平台恶意代码的检测方法及系统实现[J]. 西安交通大学学报, 2013, 47(10):37-43.(HU W J, ZHAO S, TAO J, et al. A detection method and system implementation for Android malware[J]. Journal of Xi'an Jiaotong University, 2013, 47(10):37-43.) [5] ARP D, SPREITZENBARTH M, HVBNER M, et al. DREBIN:effective and explainable detection of Android malware in your pocket[EB/OL].[2017-05-10]. https://www.tu-braunschweig.de/Medien-DB/sec/pubs/2014-ndss.pdf. [6] 罗世奇, 田生伟, 孙华, 等. 深度信念网络的恶意代码分类策略研究[J]. 小型微型计算机系统, 2017, 38(11):2465-2470.(LUO S Q, TIAN S W, SUN H, 等. Research strategy of classify malicious code into families on the method of deep belief networks[J]. Journal of Chinese Computer Systems, 2017, 38(11):2465-2470.) [7] 罗世奇, 田生伟, 孙华, 等. 栈式自编码的恶意代码分类算法研究[J]. 计算机应用研究, 2018, 35(1):261-265.(LUO S Q, TIAN S W, SUN H, et al. Research on malicious code classification algorithm of stacked auto encoder[J]. Application Research of Computers, 2018, 35(1):261-265.) [8] SESHAGIRI P, VAZHAYIL A, SRIRAM P. AMA:static code analysis of Web page for the detection of malicious scripts[J]. Procedia Computer Science, 2016, 93:768-773. [9] SHIBAHARA T, YAGI T, AKIYAMA M, et al. Efficient dynamic malware analysis based on network behavior using deep learning[C]//Proceedings of the 2016 IEEE Global Communications Conference. Piscataway, NJ:IEEE, 2017:1-7. [10] MOSER A, KRUEGEL C, KIRDA E. Limits of static analysis for malware detection[C]//Proceedings of the Twenty-Third Annual Computer Security Applications Conference. Piscataway, NJ:IEEE, 2007:421-430. [11] CAO S, YANG N, LIU Z. Online news recommender based on stacked auto-encoder[C]//Proceedings of the 2017 IEEE/ACIS 16th International Conference on Computer and Information Science. Piscataway, NJ:IEEE, 2017:721-726. [12] NATARAJ L, KARTHIKEYAN S, JACOB G, et al. Malware images:visualization and automatic classification[C]//VizSec 2011:Proceedings of the 8th International Symposium on Visualization for Cyber Security. New York:ACM, 2011:Article No. 4. [13] SHAID S Z M, MAAROF M A. Malware behavior image for malware variant identification[C]//Proceedings of the 2014 International Symposium on Biometrics and Security Technologies. Piscataway, NJ:IEEE, 2015:238-243. [14] KANCHERLA K, MUKKAMALA S. Image visualization based malware detection[C]//Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security. Piscataway, NJ:IEEE, 2013:40-44. [15] 韩晓光, 曲武, 姚宣霞, 等. 基于纹理指纹的恶意代码变种检测方法研究[J]. 通信学报, 2014, 35(8):125-136.(HAN X G, QU W, YAO X X, et al. Research on malicious code variants detection based on texture fingerprint[J]. Journal on Communications, 2014, 35(8):125-136.) [16] 韩晓光, 姚宣霞, 曲武, 等. 基于图像纹理聚类的恶意代码家族标注方法[J]. 解放军理工大学学报(自然科学版), 2014(5):440-449.(HAN X G, YAO X X, QU W, et al. Malicious code family tagging based on image texture clustering technology[J]. Journal of PLA University of Science and Technology (Natural Science Edition), 2014(5):440-449.) |