Stealth attacks: An extended insight into the obfuscation effects on Android malware
Tóm tắt
Từ khóa
Tài liệu tham khảo
Allatori, http://www.allatori.com/features/android-obfuscation.html.
Amazon App Store, http://www.amazon.com/appstore.
Androguard, http://code.google.com/p/androguard/...
Android Open Source Project, 2007
Anubis, https://anubis.iseclab.org/.
ApkFuscator
A. Apvrille, R. Nigam, Obfuscation in Android malware, and how to fight back, https://www.virusbtn.com/virusbulletin/archive/2014/07/vb201407-Android-obfuscation.
Arp, 2014, Drebin: efficient and explainable detection of android malware in your pocket
Baksmali, https://code.google.com/p/smali/.
Mario Ballano, Android Malware, www.itu.int/ITU-D/eur/rf/cybersecurity/presentations/symantec-itu_mobile.pdf.
BGR, An incredibly sneaky piece of malware has finally been pulled from Google Play, http://bgr.com/2014/06/18/google-play-store-android-malware-app/.
Bluebox, Android Fake ID Vulnerability Lets Malware Impersonate Trusted Applications, Puts All Android Users Since January 2010 At Risk, https://bluebox.com/technical/android-fake-id-vulnerability/.
Cisco, Snort, http://www.snort.org.
Collberg, 1997
AV Comparatives, http://www.av-comparatives.org/.
AV Comparatives, Cybercriminals infiltrate Android markets, http://www.av-comparatives.org/wp-content/uploads/2013/08/apkstores_investigation_2013.pdf.
DashO, https://www.preemptive.com/products/dasho.
Dedexer, http://dedexer.sourceforge.net/.
DexProtector, http://dexprotector.com/.
F-Secure, 2014
Huang, 2013, A framework for evaluating mobile app repackaging detection algorithms, 169
Ionescu, 2012
Jiang, 2011
Labs, 2011
Lookout Labs, Dendroid malware can take over your camera, record audio, and sneak into Google Play, https://blog.lookout.com/blog/2014/03/06/dendroid/.
E. Lafortune, ProGuard, http://developer.android.com/tools/help/proguard.html.
Maggi, 2013, AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors
Nihilus, 2013
Nolan, 2012
Oracle, Java Reflection API, http://docs.oracle.com/javase/tutorial/reflect/.
Palo Alto Networks, Bad Certificate Management in Google Play Store, http://researchcenter.paloaltonetworks.com/2014/08/bad-certificate-management-google-play-store/.
M. Parkour, Contagio Mobile – Mobile Malware Mini Dump, http://contagiominidump.blogspot.com/.
Petsas, 2014, Rage against the virtual machine: hindering dynamic analysis of android malware, 5:1
Protsenko, 2013, PANDORA applies non-deterministic obfuscation randomly to android, 59
Rastogi, 2013, DroidChameleon: evaluating android anti-malware against transformation attacks, 329
Rastogi, 2014, Catch me if you can: evaluating android anti-malware against transformation attacks, IEEE Trans Inf Forens Secur, 9, 99, 10.1109/TIFS.2013.2290431
Samsung App Store, http://apps.samsung.com.
SecurityWatch, Banking Malware Pulled From Google Play, http://securitywatch.pcmag.com/mobile-security/325324-banking-malware-pulled-from-google-play.
Trendmicro, A look at Google Bouncer, http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-google-bouncer/.
Unuchek, 2013
VirusTotal, https://www.virustotal.com.
Yu, 2013, Ginmaster: a case study in Android Malware
Zheng, 2012, ADAM: an automatic and extensible platform to stress test android anti-virus systems, 82
Zhou, 2012
Zhou, 2012, Dissecting android malware: characterization and evolution, 95