參考文獻 |
[1] A. Gostev, R. Unuchek, M. Garnaeva, D. Makrushin, and A. Ivanov, “IT THREAT EVOLUTION IN Q1 2016.”
[2] R. Nigam, “A Timeline of Mobile Botnets,” in Botconf, 2014.
[3] K. Darbar and T. Chaudhari, “A Review on : SMS Botnet Detection,” Int. J. Emerg. Technol. Adv. Eng., vol. 5, no. 2, 2015.
[4] A. J. Alzahrani and A. A. Ghorbani, “SMS mobile botnet detection using a multi-agent system,” Proc. 1st Int. Work. Agents CyberSecurity - ACySE ’14, pp. 1–8, 2014.
[5] 趙閩 and 倪超, “逃离安卓动态检测,” in HITCON, 2013.
[6] T. Vidas and N. Christin, “Evading android runtime analysis via sandbox detection,” ASIA CCS ’14 (9th ACM Symp. Information, Comput. Commun. Secur., pp. 447–458, 2014.
[7] P. Lantz, “Droidbox.” [Online]. Available: https://github.com/pjlantz/droidbox.
[8] L. Weichselbaum, M. Neugschwandtner, M. Lindorfer, Y. Fratantonio, V. Van Der Veen, and C. Platzer, “ANDRUBIS : Android Malware Under The Magnifying Glass,” Vienna Univ. Technol. Tech. Rep. TRISECLAB-0414-001, no. February, 2012.
[9] M. Eslahi, M. R. Rostami, H. Hashim, N. M. Tahir, and M. V. Naseri, “A data collection approach for Mobile Botnet analysis and detection,” IEEE Symp. Wirel. Technol. Appl. ISWTA, no. September, pp. 199–204, 2014.
[10] A. Flo and A. Josang, “Consequences of botnets spreading to mobile devices,” Short-Paper Proc. 14th Nord. Conf. Secur. IT Syst. (NordSec 2009), no. October, pp. 37–43, 2009.
[11] I. Vural and H. Venter, “Mobile Botnet Detection Using Network Forensics,” in Third Future Internet Symposium, 2010, vol. 6369, pp. 55–67.
[12] A. Feizollah, N. B. Anuar, R. Salleh, F. Amalina, R. R. Ma’arof, and S. Shamshirband, “A study of machine learning classifiers for anomaly-based mobile botnet detection,” Malaysian J. Comput. Sci., vol. 26, no. 4, pp. 251–265, 2013.
[13] B. Choi, S. K. Choi, and K. Cho, “Detection of mobile botnet using VPN,” Proc. - 7th Int. Conf. Innov. Mob. Internet Serv. Ubiquitous Comput. IMIS 2013, pp. 142–148, 2013.
[14] C. Mulliner and J. P. Seifert, “Rise of the iBots: Owning a telco network,” Proc. 5th IEEE Int. Conf. Malicious Unwanted Software, Malware 2010, pp. 71–80, 2010.
[15] McAfee, “Android/SmsHowU.A.” [Online]. Available: http://home.mcafee.com/virusinfo/virusprofile.aspx?key=367587. [Accessed: 10-Apr-2016].
[16] C. Mulliner and C. Miller, “Fuzzing the Phone in your Phone,” Black Hat USA 2009, pp. 1–21, 2009.
[17] Y. Zeng, K. Shin, and X. Hu, “Design of SMS commanded-and-controlled and P2P-structured mobile botnets,” … Secur. Priv. Wirel. Mob. …, no. February, pp. 137–148, 2012.
[18] J. Hua and K. Sakurai, “A SMS-based mobile botnet using flooding algorithm,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6633 LNCS, pp. 264–279, 2011.
[19] S. Zhao, P. P. C. Lee, J. C. S. Lui, X. Guan, X. Ma, and J. Tao, “Cloud-based Push-Styled Mobile Botnets : A Case Study of Exploiting the Cloud to Device Messaging Service,” ACSAC ’12 Proc. 28th Annu. Comput. Secur. Appl. Conf., pp. 119–128, 2012.
[20] J. Grunzweig, “NickiSpy.C - Android Malware Analysis & Demo,” 2011. [Online]. Available: https://www.trustwave.com/Resources/SpiderLabs-Blog/NickiSpy-C---Android-Malware-Analysis--Demo/. [Accessed: 10-Apr-2016].
[21] A. Nguyan and L. Pan, “Detecting SMS-based Control Commands in a Botnet from Infected Android Devices,” 2012.
[22] W. Wang, I. Murynets, J. Bickford, C. Van Wart, and G. Xu, “What you see predicts what you get—lightweight agent-based malware detection,” Secur. Commun. Networks, vol. 6, no. 1, pp. 33–48, 2013.
[23] “SMS Text Messaging API for Web Applications - Twilio.” [Online]. Available: https://www.twilio.com/sms. [Accessed: 09-Nov-2015].
[24] “REST API: Sending SMS or MMS.” [Online]. Available: https://www.twilio.com/docs/api/rest/sending-messages. [Accessed: 09-Nov-2015].
[25] “REST API: Messages.” [Online]. Available: https://www.twilio.com/docs/api/rest/message. [Accessed: 09-Nov-2015].
[26] “Ranking - AnTuTu Benchmark -- Know Your Android Better.” [Online]. Available: http://www.antutu.com/en/Ranking.shtml. [Accessed: 08-Nov-2015].
[27] “A Free SMS.” [Online]. Available: http://www.afreesms.com/.
[28] “Globfone.” [Online]. Available: https://globfone.com/sms/.
[29] “Receive SMS Online.” [Online]. Available: http://www.receive-sms-online.info/.
[30] M. Zuhair, M. Saudi, and N. Basir, “A Comprehensive Review of Mobile Botnet Detection Using Genetic Algorithm : a Systematic Review,” vol. 10, no. 3, pp. 1399–1404, 2015.
[31] TextR.Us, “Anonytext.” [Online]. Available: https://play.google.com/store/apps/details?id=us.textr.Anonytext. |