|
[1]
|
Richard Nieva, Google Is Doing Deep Surgery on Android.
https://www.cnet.com/news/google-io-2017-android-o-project-treble-tv-go/2017
|
|
[2]
|
http://www.appbrain.com/stats/number-of-android-apps
|
|
[3]
|
Qu, Z.Y., Alam, S., Chen, Y., Zhou, X.Y., et al. (2017) DYDROID: Measuring Dynamic Code Loading and Its Security Implications in Android Applications. 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, 26-29 June 2017, 415-426.
|
|
[4]
|
Poeplau, S., Fratantonio, Y., Bianchi, A., et al. (2014) Execute This! Analyzing Un-safe and Malicious Dynamic Code Loading in Android Applications. NDSS Symposium, San Diego, 23-26 February 2014.
|
|
[5]
|
Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., et al. (2015) StaDynA: Addressing the Problem of Dynamic Code Up-dates in the Security Analysis of Android Applications. Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. [Google Scholar] [CrossRef]
|
|
[6]
|
Tan, D.J.J., Chua, T.-W., Thing, V.L.L., et al. (2015) Securing Android: A Survey, Taxonomy, and Challenges. ACM Computing Surveys (CSUR), 47, 58.
|
|
[7]
|
Grace, M.C., Zhou, W., Jiang, X. and Sadeghi, A.-R. (2012) Unsafe Exposure Analysis of Mobile In-App Advertisements. WiSec, Tucson, 16-18 April 2012.
|
|
[8]
|
ANDRUBIS-1,000,000 Apps Later: A View on Current Android Malware Behaviors.
|
|
[9]
|
Book, T., Pridgen, A., DanLongitudinal, S.W., et al. (2013) Analysis of Android Ad Library Permissions. Computer Science.
|
|
[10]
|
Igor, S., Felix, B., Xabier, U.P. and Pablo, G.B. (2013) Opcode Sequences as Representation of Executables for Data-Mining-Based Unknown Malware Detec-tion. Information Science, 231, 64-82. [Google Scholar] [CrossRef]
|
|
[11]
|
Sahs, J. and Khan, L. (2012) A Machine Learning Approach to Android Malware Detection. European Intelligence & Security Informatics Conference, Odense, 22-24 August 2012, 141-147.
|
|
[12]
|
Allix, K., Bissyandé, T.F., Jérome, Q., Klein, J., et al. (2016) Empirical Assessment of Machine Learning-Based Malware Detectors for Android. Empirical Software Engineering, 21, 183-211.
|
|
[13]
|
Falsina, L., Fratantonio, Y., Zanero, S., et al. (2015) Grab’n Run: Secure and Practical Dy-namic Code Loading for Android Applications. Computer Security Applications Conference, Los Angeles, 7-11 December 2015, 201-210.
|
|
[14]
|
https://www.seleniumhq.org/
|
|
[15]
|
https://developer.android.com/reference/dalvik/system/DexClassLoader
|
|
[16]
|
https://play.google.com/about/developer-content-policy-print/
|
|
[17]
|
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., et al. (2014) FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, 9-11 June 2014, Vol. 49, 259-269.
|
|
[18]
|
Li, L., Bis-syande, T.F., Klein, J. and Traon, Y.L. (2016) An Investigation into the Use of Common Libraries in Android Apps. 23rd International Conference on Software Analysis, Evolution, and Reengineering, Suita, 14-18 March 2016, 403-414. [Google Scholar] [CrossRef]
|
|
[19]
|
Desnos, A. Androguard—Reverse Engineering, Malware and Goodwar Analysis of Android Applications and More (ninja!). http://code.google.com/p/androguard/
|
|
[20]
|
https://github.com/asLody/VirtualApp
|