SECURITY CONTROLS AGAINST MOBILE APPLICATION THREATS
Abstract
Keywords
References
- [1] T. Vidas, N. Christin, and L. F. Cranor, Curbing Android Permission Creep, in In Proceedings of the 2011 Web 2.0 Security and Privacy Workshop (W2SP 2011), 2011.
- [2] P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, in Proceedings of the 18th ACM conference on Computer and communications security - CCS 11, 2011, p. 627.
- [3] Dynamic Analysis vs. Static Analysis, Intel, 2013. [Web]. Retrieved from: https://software.intel.com/sites/products/documentati on/doclib/
- [4] Burguera, U. Zurutuza, and S. Nadjm-Tehrani, Crowdroid: behavior-based malware detection system for Android, Science (80-. )., pp. 1525, 2011
- [5] M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, RiskRanker: Scalable and Accurate Zero-day Android Malware Detection, in Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys 12, 2012, pp. 281294.
- [6] G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, Paranoid Android: Versatile Protection For Smartphones, in Annual Computer Security Applications Conference (ACSAC), 2010, pp. 347 356.
- [7] M. Guido, J. Ondricek, J. Grover, D. Wilburn, T. Nguyen, and A. Hunt, Automated identification of installed malicious Android applications, Digit. Investig., vol. 10, pp. 96104, 2013.
- [8] G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware, in Computer Network Security, vol. 7531, I. Kotenko and V. Skormin, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 240 253.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Review
Authors
Ahmet Efe
*
0000-0002-2691-7517
Türkiye
Şerife Özdamarlar
This is me
0000-0001-9186-8734
Türkiye
Publication Date
May 1, 2021
Submission Date
December 10, 2020
Acceptance Date
February 3, 2021
Published in Issue
Year 2021 Volume: 3 Number: 2
