RESET analyzes first android fileencrypting, TOR-enabled ransomware, 2014. ,
Security alert: New sophisticated android malware droidkungfu found in alternative chinese app markets, 2011. ,
Kharon dataset: Android malware under a microscope, The LASER 1 ,
URL : https://hal.archives-ouvertes.fr/hal-01311917
, fr and resources: http://kharon.gforge.inria.fr 2 Distribution dashboard : https://developer.android.com/about/dashboard This work has received a French government support granted to the COMIN Labs excellence laboratory
, Workshop: Learning from Authoritative Security Experiment Results, pp.1-12, 2016.
TriggerScope: Towards Detecting Logic Bombs in Android Applications, 2016 IEEE Symposium on Security and Privacy (SP), pp.1-33, 2016. ,
DOI : 10.1109/SP.2016.30
CopperDroid: Automatic Reconstruction of Android Malware Behaviors, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23145
GroddDroid: a gorilla for triggering malicious behaviors, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.119-127, 2015. ,
DOI : 10.1109/MALWARE.2015.7413692
URL : https://hal.archives-ouvertes.fr/hal-01201743
Deep Ground Truth Analysis of Current Android Malware, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.252-276, 2017. ,
DOI : 10.14722/ndss.2015.23145
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109 ,
DOI : 10.1109/SP.2012.16
AndroZoo, Proceedings of the 13th International Workshop on Mining Software Repositories, MSR '16, pp.468-471, 2016. ,
DOI : 10.1109/SP.2012.16
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting, IEEE Transactions on Information Forensics and Security, vol.12, issue.6, pp.1269-1284, 2017. ,
DOI : 10.1109/TIFS.2017.2656460
Apposcopy: semantics-based detection of Android malware through static analysis, Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp.576-587, 2014. ,
DOI : 10.1145/2635868.2635869
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation, Proceedings 2018 Network and Distributed System Security Symposium, 2018. ,
DOI : 10.14722/ndss.2018.23296
DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.163-171, 2013. ,
Evading android runtime analysis via sandbox detection, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.447-458, 2014. ,
DOI : 10.1145/2590296.2590325
IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware, Proceedings 2016 Network and Distributed System Security Symposium, pp.21-24 ,
DOI : 10.14722/ndss.2016.23118
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications, pp.19-2014 ,
IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware, Proceedings 2016 Network and Distributed System Security Symposium, pp.21-24 ,
DOI : 10.14722/ndss.2016.23118
Making Malory Behave Maliciously: Targeted Fuzzing of Android Execution Environments, 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), pp.300-311, 2017. ,
DOI : 10.1109/ICSE.2017.35
TriggerScope: Towards Detecting Logic Bombs in Android Applications, 2016 IEEE Symposium on Security and Privacy (SP), pp.1-33, 2016. ,
DOI : 10.1109/SP.2016.30
GPFinder: Tracking the invisible in Android malware, 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), pp.39-46, 2017. ,
DOI : 10.1109/MALWARE.2017.8323955
URL : https://hal.archives-ouvertes.fr/hal-01584989
Designing information flow policies for Android's operating system, 2012 IEEE International Conference on Communications (ICC), pp.976-981, 2012. ,
DOI : 10.1109/ICC.2012.6364161
Malware Detection in Adversarial Settings, Proceedings of the 33rd Annual Computer Security Applications Conference on , ACSAC 2017, pp.288-302, 2017. ,
DOI : 10.1109/ICSE.2015.50