[1] 彭国军,李晶雯,孙润康,等.Android恶意软件检测研究与进展[J].武汉大学学报(理学版),2015,61(1):21-33.(PENG G J, LI J W, SUN R K, et al. Android malware detection research and development[J]. Journal of Wuhan University (Natural Science Edition), 2015, 61(1):21-33.) [2] 卿斯汉.Android安全研究进展[J].软件学报,2016,27(1):45-71(QING S H. Research progress on Android security[J]. Journal of Software, 2016, 27(1):45-71) [3] McAfee Labs. McAfee labs threats report[EB/OL].[2017-06-01]. https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-jun-2017.pdf. [4] FEIZOLLAH A, ANUAR N B, SALLEH R, et al. A review on feature selection in mobile malware detection[J]. Digital Investigation, 2015, 13:22-37. [5] JUNAID M, LIU D, KUNG D. Dexteroid:detecting malicious behaviors in Android apps using reverse-engineered life cycle models[J]. Computers & Security, 2016, 59:92-117. [6] WU S Y, WANG P, LI X, et al. Effective detection of android malware based on the usage of data flow APIs and machine learning[J]. Information and Software Technology, 2016, 75(C):17-25. [7] ARZT S, RASTHOFER S, FRITZ C, et al. FlowDroid:precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps[C]//PLDI 2014:Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. New York:ACM, 2014:259-269. [8] DU Y, WANG X Q, WANG J F. A static Android malicious code detection method based on multi-source fusion[J]. Security & Communication Networks, 2015, 8(17):3238-3246. [9] GUAN Q, HUANG H, LUO W, et al. Semantics-based repackaging detection for mobile apps[C]//ESSoS 2016:Proceedings of the 2016 International Symposium on Engineering Secure Software and Systems. Berlin:Springer, 2016:89-105 [10] FEIZOLLAH A, ANUAR N B, SALLEH R, et al. AndroDialysis:analysis of Android intent effectiveness in malware detection[J]. Computers & Security, 2016, 65:121-134. [11] WANG Z, LI C, YUAN Z, et al. DroidChain:a novel Android malware detection method based on behavior chains[J]. Pervasive & Mobile Computing, 2016, 32:3-14. [12] XIAO X, XIAO X, JIANG Y, et al. Identifying Android malware with system call co-occurrence matrices[J]. Transactions on Emerging Telecommunications Technologies, 2016, 27(5):675-684. [13] ENCK W, GILBERT P, CHUN B G, et al. TaintDroid:an information flow tracking system for real-time privacy monitoring on smartphones[J]. Communications of the ACM, 2014, 57(3):99-106. [14] 孙润康,彭国军,李晶雯,等.基于行为的Android恶意软件判定方法及其有效性[J].计算机应用,2016,36(4):973-978.(SUN R K, PENG G J, LI J W, et al. Behavior oriented method of Android malware detection and its effectiveness[J]. Journal of Computer Applications, 2016, 36(4):973-978.) [15] FENG P, SUN C, MA J. Selecting critical data flows in android applications for abnormal behavior detection[J]. Mobile Information Systems, 2017, 2017:Article ID 7397812. |