參考文獻 |
[1]“Smartphone subscriptions worldwide 2027,” Statista. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/ (accessed Sep. 07, 2022).
[2]“Global mobile OS market share 2012-2022,” Statista. https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/ (accessed Sep. 07, 2022).
[3]M. Hammad, J. Garcia, and S. Malek, “A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware products,” in Proceedings of the 40th International Conference on Software Engineering, in ICSE ’18. New York, NY, USA: Association for Computing Machinery, May 2018, pp. 421–431. doi: 10.1145/3180155.3180228.
[4]“DANdroid | Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy.” https://dl.acm.org/doi/abs/10.1145/3374664.3375746 (accessed Mar. 02, 2023).
[5]Y. Yang, X. Du, Z. Yang, and X. Liu, “Android Malware Detection Based on Structural Features of the Function Call Graph,” Electronics, vol. 10, p. 186, Jan. 2021, doi: 10.3390/electronics10020186.
[6]Y. Jiang, R. Li, J. Tang, A. Davanian, and H. Yin, “AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning,” in Security and Privacy in Communication Networks, N. Park, K. Sun, S. Foresti, K. Butler, and N. Saxena, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cham: Springer International Publishing, 2020, pp. 242–253. doi: 10.1007/978-3-030-63095-9_14.
[7]“Drebin: Effective and Explainable Detection of Android Malware in Your Pocket – NDSS Symposium.” https://www.ndss-symposium.org/ndss2014/programme/drebin-effective-and-explainable-detection-android-malware-your-pocket/ (accessed Sep. 23, 2022).
[8]M. Fan et al., “Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1890–1905, Aug. 2018, doi: 10.1109/TIFS.2018.2806891.
[9]J. Tang, R. Li, Y. Jiang, X. Gu, and Y. Li, “Android malware obfuscation variants detection method based on multi-granularity opcode features,” Future Gener. Comput. Syst., vol. 129, no. C, pp. 141–151, Apr. 2022, doi: 10.1016/j.future.2021.11.005.
[10]Q. Li, Q. Hu, Y. Qi, S. Qi, X. Liu, and P. Gao, “Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding,” Knowledge-Based Systems, vol. 218, p. 106802, Apr. 2021, doi: 10.1016/j.knosys.2021.106802.
[11]“PetaDroid: Adaptive Android Malware Detection Using Deep Learning | SpringerLink.” https://link.springer.com/chapter/10.1007/978-3-030-80825-9_16 (accessed Sep. 23, 2022).
[12]Y. Sung, S. Jang, Y.-S. Jeong, and J. H. (James J. ) Park, “Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations,” Computer Communications, vol. 153, pp. 342–348, Mar. 2020, doi: 10.1016/j.comcom.2020.02.005.
[13]G. C. Georgiu, “ClaudiuGeorgiu/Obfuscapk.” Nov. 23, 2022. Accessed: Nov. 25, 2022. [Online]. Available: https://github.com/ClaudiuGeorgiu/Obfuscapk
[14]S. Arshad, M. Shah, A. Khan, and M. Ahmed, “Android Malware Detection & Protection: A Survey,” International Journal of Advanced Computer Science and Applications, vol. 7, Feb. 2016, doi: 10.14569/IJACSA.2016.070262.
[15]“A Review of Android Malware Detection Approaches Based on Machine Learning | IEEE Journals & Magazine | IEEE Xplore.” https://ieeexplore.ieee.org/document/9130686 (accessed Sep. 26, 2022).
[16]B. H. Tang et al., “Android Malware Detection Based on Deep Learning Techniques,” in 2021 4th International Conference on Pattern Recognition and Artificial Intelligence (PRAI), Aug. 2021, pp. 481–486. doi: 10.1109/PRAI53619.2021.9551073.
[17]S. Dong et al., “Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild,” Jan. 2018.
[18]V. Sihag, M. Vardhan, and P. Singh, “A survey of android application and malware hardening,” Computer Science Review, vol. 39, p. 100365, Feb. 2021, doi: 10.1016/j.cosrev.2021.100365.
[19]A. Apvrille and R. Nigam, “OBFUSCATION IN ANDROID MALWARE, AND HOW TO FIGHT BACK,” p. 10, 2014.
[20]A. Bacci, A. Bartoli, F. Martinelli, E. Medvet, and F. Mercaldo, “Detection of Obfuscation Techniques in Android Applications,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg Germany: ACM, Aug. 2018, pp. 1–9. doi: 10.1145/3230833.3232823.
[21]V. Rastogi, Y. Chen, and X. Jiang, “Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 99–108, Jan. 2014, doi: 10.1109/TIFS.2013.2290431.
[22]X. Lu, J. Zhao, and P. Lio, “Robust android malware detection based on subgraph network and denoising GCN network,” in Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services, in MobiSys ’22. New York, NY, USA: Association for Computing Machinery, Jun. 2022, pp. 549–550. doi: 10.1145/3498361.3538778.
[23]S. Kumar, D. Mishra, B. Panda, and S. K. Shukla, “DeepDetect: A Practical On-device Android Malware Detector,” in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS), Feb. 2021, pp. 40–51. doi: 10.1109/QRS54544.2021.00015.
[24]Y. Wu, S. Dou, D. Zou, W. Yang, W. Qiang, and H. Jin, “Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning.” arXiv, Jul. 08, 2021. doi: 10.48550/arXiv.2107.03799.
[25]P. Singh, S. K. Borgohain, and J. Kumar, “Performance Enhancement of SVM-based ML Malware Detection Model Using Data Preprocessing,” in 2022 2nd International Conference on Emerging Frontiers in Electrical and Electronic Technologies (ICEFEET), Jun. 2022, pp. 1–4. doi: 10.1109/ICEFEET51821.2022.9848192.
[26]J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, “LINE: Large-scale Information Network Embedding,” in Proceedings of the 24th International Conference on World Wide Web, in WWW ’15. Republic and Canton of Geneva, CHE: International World Wide Web Conferences Steering Committee, May 2015, pp. 1067–1077. doi: 10.1145/2736277.2741093.
[27]“Structural Deep Network Embedding | Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.” https://dl.acm.org/doi/10.1145/2939672.2939753 (accessed Oct. 12, 2022).
[28]A. Grover and J. Leskovec, “node2vec: Scalable Feature Learning for Networks,” KDD, vol. 2016, pp. 855–864, Aug. 2016, doi: 10.1145/2939672.2939754.
[29]“struc2vec | Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.” https://dl.acm.org/doi/abs/10.1145/3097983.3098061?casa_token=jbKAq2czGl8AAAAA:Bku89SFCqgrIUNrPMK8fUBgtUrA0LJhW3tJtsz83QkdsA42WOF1stZ2Ua7-uzXeb_zA3XCZTCTCpVAQ (accessed Oct. 12, 2022).
[30]B. Perozzi, R. Al-Rfou, and S. Skiena, “DeepWalk: online learning of social representations,” in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, in KDD ’14. New York, NY, USA: Association for Computing Machinery, Aug. 2014, pp. 701–710. doi: 10.1145/2623330.2623732.
[31]F. Zhuang et al., “A Comprehensive Survey on Transfer Learning,” Proceedings of the IEEE, vol. 109, no. 1, pp. 43–76, Jan. 2021, doi: 10.1109/JPROC.2020.3004555.
[32]E. Tzeng, J. Hoffman, N. Zhang, K. Saenko, and T. Darrell, “Deep Domain Confusion: Maximizing for Domain Invariance.” arXiv, Dec. 10, 2014. doi: 10.48550/arXiv.1412.3474.
[33]L. Jingjing, C. Erpeng, D. Zhengming, Z. Lei, L. Ke, and S. H. Tao, “Maximum Density Divergence for Domain Adaptation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 43, no. 11, pp. 3918–3930, Nov. 2021, doi: 10.1109/TPAMI.2020.2991050.
[34]“Androguard.” androguard, Aug. 26, 2022. Accessed: Aug. 26, 2022. [Online]. Available: https://github.com/androguard/androguard
[35]M. Backes, S. Bugiel, E. Derr, P. McDaniel, D. Octeau, and S. Weisgerber, “On Demystifying the Android Application Framework: {Re-Visiting} Android Permission Specification Analysis,” presented at the 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 1101–1118. Accessed: Oct. 01, 2022. [Online]. Available: https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes_android
[36]K. Allix, T. F. Bissyandé, J. Klein, and Y. Le Traon, “AndroZoo: collecting millions of Android apps for the research community,” in Proceedings of the 13th International Conference on Mining Software Repositories, Austin Texas: ACM, May 2016, pp. 468–471. doi: 10.1145/2901739.2903508.
[37]“The Drebin Dataset.” https://www.sec.tu-bs.de/~danarp/drebin/ (accessed Oct. 25, 2022).
[38]“Deep Ground Truth Analysis of Current Android Malware | SpringerLink.” https://link.springer.com/chapter/10.1007/978-3-319-60876-1_12 (accessed Oct. 25, 2022).
[39]J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, and H. Ye, “Significant Permission Identification for Machine-Learning-Based Android Malware Detection,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3216–3225, Jul. 2018, doi: 10.1109/TII.2017.2789219.
[40]D. Zhu, H. Jin, Y. Yang, D. Wu, and W. Chen, “DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data,” in 2017 IEEE Symposium on Computers and Communications (ISCC), Jul. 2017, pp. 438–443. doi: 10.1109/ISCC.2017.8024568.
[41]X. Ge, Y. Pan, Y. Fan, and C. Fang, “AMDroid: Android Malware Detection Using Function Call Graphs,” in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Jul. 2019, pp. 71–77. doi: 10.1109/QRS-C.2019.00027.
[42]“DexProtector,” DexProtector, Aug. 29, 2014. https://dexprotector.com/dexprotector (accessed Mar. 15, 2023). |