Exploiting Model Checking for Mobile Botnet Detection
Tài liệu tham khảo
Andersen, 2015, 573
Avvenuti, M., Bernardeschi, C., De Francesco, N., Masci, P., 2012. JCSI: A tool for checking secure information flow in java card applications. Journal of Systems and Software 85, 2479–2493. URL: https://doi.org/10.1016/j.jss.2012.05.061, doi:10.1016/j.jss.2012.05.061.
Canfora, G., Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A., 2018. Leila: formal tool for identifying mobile malicious behaviour. IEEE Transactions on Software Engineering.
Choi, 2013, 142
Cimitile, 2017, 263
Cimitile, 2018, Talos: no more ransomware victims with formal methods, International Journal of Information Security, 17, 719, 10.1007/s10207-017-0398-5
Clarke, 1986, Automatic verification of finite-state concurrent systems using temporal logic specifications, ACM Transactions on proramming Languages and Systems, 8, 244, 10.1145/5397.5399
Clarke, 2001
Faruki, 2015, Android security: a survey of issues, malware penetration, and defenses, IEEE communications surveys & tutorials, 17, 998, 10.1109/COMST.2014.2386139
Jadhav, 2015, 347
Kadir, 2015, 78
Karim, 2014, Botnet detection techniques: review, future trends, and issues, Journal of Zhejiang University SCIENCE C, 15, 943, 10.1631/jzus.C1300242
Letteri, I., Del Rosso, M., Caianiello, P., Cassioli, D., 2018. Performance of botnet detection by neural networks in software-defined networks, in: CEUR WORKSHOP PROCEEDINGS, CEUR-WS.
Martinelli, 2018, Evaluating model checking for cyber threats code obfuscation identification, Journal of Parallel and Distributed Computing, 119, 203, 10.1016/j.jpdc.2018.04.008
Martinelli, 2017, 899
Mercaldo, 2016, 22
Mercaldo, 2016, 744
Milner, 1989
Pieterse, 2012, 1
Stirling, 1989, 2
Tansettanakorn, 2016, 1
Zhang, Y., Zheng, J., Ma, M., 2008. Handbook of research on wireless security.
Zhou, Y., Jiang, X., 2012. Dissecting android malware: Characterization and evolution, in: Proceedings of 33rd IEEE Symposium on Security and Privacy (Oakland 2012).