參考文獻 |
[參考網站]
[1] APKpure [Online]. Available: https://apkpure.com/tw/.
[2] Chau, M. (2018 ). Smartphone Market Share [Online]. Available: https://www.idc.com/promo/smartphone-market-share/os.
[3] Chebyshev, V. (2019). Mobile malware evolution 2018 [Online]. Available: https://securelist.com/mobile-malware-evolution-2018/89689/.
[4] Hoffman, G. (2018). Introduction to LSTMs with TensorFlow [Online]. Available: https://www.oreilly.com/ideas/introduction-to-lstms-with-tensorflow.
[5] Paller, G. (2018). Dalvik opcodes [Online]. Available: http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html.
[英文文獻]
[6] Alshahrani, H., Mansourt, H., Thorn, S., Alshehri, A., Alzahrani, A., and Fu, H., "DDefender: Android application threat detection using static and dynamic analysis," in 2018 IEEE International Conference on Consumer Electronics (ICCE), 2018: IEEE, pp. 1-6.
[7] Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., and Siemens, C., "Drebin: Effective and explainable detection of android malware in your pocket," in Ndss, 2014, vol. 14, pp. 23-26.
[8] Bacci, A., Bartoli, A., Martinelli, F., Medvet, E., and Mercaldo, F., "Detection of Obfuscation Techniques in Android Applications," in Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018: ACM, p. 57.
[9] Bengio, Y., Simard, P., and Frasconi, P., "Learning long-term dependencies with gradient descent is difficult," IEEE transactions on neural networks, vol. 5, no. 2, pp. 157-166, 1994.
[10] Canfora, G., De Lorenzo, A., Medvet, E., Mercaldo, F., and Visaggio, C. A., "Effectiveness of opcode ngrams for detection of multi family android malware," in 2015 10th International Conference on Availability, Reliability and Security, 2015: IEEE, pp. 333-340.
[11] Canfora, G., Mercaldo, F., and Visaggio, C. A., "Mobile malware detection using op-code frequency histograms," in 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), 2015, vol. 4: IEEE, pp. 27-38.
[12] Chen, T., Mao, Q., Yang, Y., Lv, M., and Zhu, J., "TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification," Mobile Information Systems, vol. 2018, 2018.
[13] Graves, A., "Long short-term memory," in Supervised sequence labelling with recurrent neural networks: Springer, 2012, pp. 37-45.
[14] Hasegawa, C. and Iyatomi, H., "One-dimensional convolutional neural networks for Android malware detection," in 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA), 2018: IEEE, pp. 99-102.
[15] Hochreiter, S. and Schmidhuber, J., "Long short-term memory," Neural computation, vol. 9, no. 8, pp. 1735-1780, 1997.
[16] Hsien-De Huang, T. and Kao, H.-Y., "R2-d2: Color-inspired convolutional neural network (cnn)-based android malware detections," in 2018 IEEE International Conference on Big Data (Big Data), 2018: IEEE, pp. 2633-2642.
[17] Ioffe, S. and Szegedy, C., "Batch normalization: Accelerating deep network training by reducing internal covariate shift," International Conference on Machine Learning, 2015.
[18] Jerome, Q., Allix, K., State, R., and Engel, T., "Using opcode-sequences to detect malicious Android applications," in 2014 IEEE International Conference on Communications (ICC), 2014: IEEE, pp. 914-919.
[19] Kang, B., Kang, B., Kim, J., and Im, E. G., "Android malware classification method: Dalvik bytecode frequency analysis," in Proceedings of the 2013 research in adaptive and convergent systems, 2013: ACM, pp. 349-350.
[20] Kang, J., Jang, S., Li, S., Jeong, Y.-S., and Sung, Y., "Long short-term memory-based Malware classification method for information security," Computers & Electrical Engineering, vol. 77, pp. 366-375, 2019.
[21] Le, Q., Boydell, O., Mac Namee, B., and Scanlon, M., "Deep learning at the shallow end: Malware classification for non-domain experts," Digital Investigation, vol. 26, pp. S118-S126, 2018.
[22] Liu, Y., Guo, K., Huang, X., Zhou, Z., and Zhang, Y., "Detecting android malwares with high-efficient hybrid analyzing methods," Mobile Information Systems, vol. 2018, 2018.
[23] McKinney, W., "pandas: a foundational Python library for data analysis and statistics," Python for High Performance and Scientific Computing, vol. 14, 2011.
[24] McLaughlin, N. et al., "Deep android malware detection," in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017: ACM, pp. 301-308.
[25] Naway, A. and LI, Y., "A Review on The Use of Deep Learning in Android Malware Detection," International Journal of Computer Science and Mobile Computing, vol. 7, no. 12, pp. 42-58, 2018.
[26] Pascanu, R., Stokes, J. W., Sanossian, H., Marinescu, M., and Thomas, A., "Malware classification with recurrent networks," in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015: IEEE, pp. 1916-1920.
[27] Ren, B., Liu, C., Cheng, B., Guo, J., and Chen, J., "MobiSentry: Towards Easy and Effective Detection of Android Malware on Smartphones," Mobile Information Systems, vol. 2018, 2018.
[28] Şahın, D. Ö., Kural, O. E., Akleylek, S., and Kiliç, E., "New results on permission based static analysis for Android malware," in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018: IEEE, pp. 1-4.
[29] Sak, H., Senior, A., and Beaufays, F., "Long short-term memory recurrent neural network architectures for large scale acoustic modeling," in Fifteenth annual conference of the international speech communication association, 2014.
[30] Sorzano, C. O. S., Vargas, J., and Montano, A. P., "A survey of dimensionality reduction techniques," arXiv:1403.2877 [stat.ML], 2014.
[31] Sun, G. and Qian, Q., "Deep Learning and Visualization for Identifying Malware Families," IEEE Transactions on Dependable and Secure Computing, 2018.
[32] Vinayakumar, R., Soman, K., Poornachandran, P., and Sachin Kumar, S., "Detecting Android malware using long short-term memory (LSTM)," Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1277-1288, 2018.
[33] Wang, W., Gao, Z., Zhao, M., Li, Y., Liu, J., and Zhang, X., "DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features," IEEE Access, vol. 6, pp. 31798-31807, 2018.
[34] Wang, Y. and Zong, H., "DroidGene: Detecting Android Malware Using Its Malicious Gene," in International Conference on Bio-Inspired Computing: Theories and Applications, 2018: Springer, pp. 315-330.
[35] Winsniewski, R., "Android–apktool: A tool for reverse engineering android apk files," ed: Tech. Rep, 2012.
[36] Xiao, X., Zhang, S., Mercaldo, F., Hu, G., and Sangaiah, A. K., "Android malware detection based on system call sequences and LSTM," Multimedia Tools and Applications, vol. 78, no. 4, pp. 3979-3999, 2019.
[37] Xiaofeng, L., Xiao, Z., Fangshuo, J., Shengwei, Y., and Jing, S., "ASSCA: API based Sequence and Statistics Features Combined Malware Detection Architecture," Procedia Computer Science, vol. 129, pp. 248-256, 2018.
[38] Yan, J., Qi, Y., and Rao, Q., "LSTM-Based Hierarchical Denoising Network for Android Malware Detection," Security and Communication Networks, vol. 2018, 2018.
[39] Yan, J., Qi, Y., and Rao, Q., "Detecting malware with an ensemble method based on deep neural network," Security and Communication Networks, vol. 2018, 2018.
[40] Ye, Y., Li, T., Adjeroh, D., and Iyengar, S. S., "A survey on malware detection using data mining techniques," ACM Computing Surveys (CSUR), vol. 50, no. 3, p. 41, 2017.
[41] Yuan, Z., Lu, Y., Wang, Z., and Xue, Y., "Droid-sec: deep learning in android malware detection," in ACM SIGCOMM Computer Communication Review, 2014, vol. 44, no. 4: ACM, pp. 371-372.
[42] Yuan, Z., Lu, Y., and Xue, Y., "Droiddetector: android malware characterization and detection using deep learning," Tsinghua Science and Technology, vol. 21, no. 1, pp. 114-123, 2016.
[43] Zhang, H., Zhang, W., Lv, Z., Sangaiah, A. K., Huang, T., and Chilamkurti, N., "MALDC: a depth detection method for malware based on behavior chains," World Wide Web, pp. 1-20, 2019.
[44] Zhang, J., Qin, Z., Zhang, K., Yin, H., and Zou, J., "Dalvik opcode graph based android malware variants detection using global topology features," IEEE Access, vol. 6, pp. 51964-51974, 2018.
[45] Zhang, Y., Yang, Y., and Wang, X., "A Novel Android Malware Detection Approach Based on Convolutional Neural Network," in Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018: ACM, pp. 144-149. |