參考文獻 |
網站文獻
[1] 8,400 new Android malware samples every day. https://www.gdatasoftware.com/blog/2017/04/29712-8-400-new-android-malware-samples-every-day (Accessed: 20-Jun-2017)
[2] Contagio Blog. http://contagiominidump.blogspot.tw/ (Accessed: 20-Jun-2017)
[3] Global market share held by the leading smartphone operating systems in sales to end users from 1st quarter 2009 to 1st quarter 2017. https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/ (Accessed: 20-Jun-2017)
[4] SLocker malware is back: over 400 new variants detected by MI:RIAM. https://www.wandera.com/blog/miriam-detects-slocker-malware/ (Accessed: 20-Jun-2017)
[5] 用機器學習檢測Android惡意代碼並分類_Dalvik虛擬機&Opcode. https://kknews.cc/zh-tw/tech/n2gv8.html (Accessed: 20-Jun-2017)
[6] 惡意軟體分類. http://www.jadespring.com.tw/internet-security-center/threats/malware-classifications.html (Accessed: 20-Jun-2017)
[7] APK Extractor. https://play.google.com/store/apps/details?id=com.ext.ui&hl=zh_TW (Accessed: 20-Jun-2017)
中文文獻
[8] 楊豐盛,(2011) “Android技術內幕:探索Android核心原理與系統開發” 碁峰資訊,ISBN:9789862763407
[9] 許珈榮、林盈達、蔡濠全、李佳穎. (2012). “Android惡意程式收集,分析與評估.” 國立交通大學資訊工程系,碩士論文
英文文獻
[10] Aafer, Y., Du, W., & Yin, H. (2013, September). “Droidapiminer: Mining api-level features for robust malware detection in android.” In International Conference on Security and Privacy in Communication Systems (pp. 86-103). Springer, Cham.
[11] Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., & Siemens, C. E. R. T. (2014, February). “DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.” In National Diabetes Services Scheme(NDSS).
[12] Baskaran, B., & Ralescu, A. (2016). “A Study of Android Malware Detection Tech-niques and Machine Learning.” In Modern Artificial Intelligence and Cognitive Science Conference. eCommence.
[13] Canfora, G., De Lorenzo, A., Medvet, E., Mercaldo, F., & Visaggio, C. A. (2015, August). “Effectiveness of opcode ngram for detection of multi family android malware.” In Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp. 333-340) IEEE.
[14] Jerome, Q., Allix, K., State, R., & Engel, T. (2014, June). “Using opcode-sequences to detect malicious Android applications.” In Communications (ICC), 2014 IEEE International Conference on (pp. 914-919).
[15] Kang, B., Yerima, S. Y., McLaughlin, K., & Sezer, S. (2016, June). “N-opcode analysis for android malware classification and categorization.” In Cyber Security And Protection Of Digital Services (Cyber Security), 2016 International Conference On (pp. 1-7) IEEE.
[16] Niall McLaughlin et al. (2017, March). “Deep Android Malware Detection.” In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (pp. 301-308).
[17] Moonsamy, V., Rong, J., Liu, S., Li, G., & Batten, L. M. (2013, September). “Con-trasting Permission Patterns between Clean and Malicious Android Applications.” In SecureComm (pp. 69-85).
[18] Ping, X., Xiaofeng, W., Wenjia, N., Tianqing, Z., & Gang, L. (2014). “Android malware detection with contrasting permission patterns.” China Communications, IEEE
[19] B.B. Rad and M. Masrom. (2010) “Metamorphic Virus Variants Classification Using Opcode Frequency Histogram.” Latest Trends on Computers (Volume I).
[20] Wang, Xiaoqing, Junfeng Wang, and Xiaolan Zhu. (2016) “A Static Android Mal-ware Detection Based on Actual Used Permissions Combination and API Calls.” World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering 10.9 : 1630-1637.
[21] Wang, Z., Li, C., Guan, Y., & Xue, Y. (2015, September). “Droidchain: A novel malware detection method for android based on behavior chain.” In Communica-tions and Network Security (CNS), 2015 IEEE Conference on (pp. 727-728).
[22] Yang, C., Xu, Z., Gu, G., Yegneswaran, V., & Porras, P. (2014, September). “Droidminer: Automated mining and characterization of fine-grained malicious be-haviors in android applications.” In European Symposium on Research in Computer Security (pp. 163-182). Springer, Cham.
[23] Yerima, Suleiman Y., Sakir Sezer, and Igor Muttik. (2015) “Android malware de-tection: An eigenspace analysis approach.” Science and Information Conference (SAI), 2015. IEEE.
[24] Yuhui, Fan, and Xu Ning. (2015) “The Analysis of Android Malware Behaviors.” International Journal of Security and Its Applications, pp.335-346. |