|
[1]Steven Euijong Whang, and Hector Garcia-Molina, “A model for quantifying information leakage,” Lecture Notes in Computer Science (SDM 2012), Vol. 7482, 2012, pp. 25-44. [2]Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schtze, Introduction to information retrieval, Cambridge University Press, NY, USA, 2008. [3]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” In Proceedings of the 9th USENIX conference on Operating systems design and implementation (OSDI’10), Berkeley, CA, USA, 2010, pp. 1-6. [4]Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen, “AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale,” In Proceedings of the 5th international conference on Trust and Trustworthy Computing (TRUST'12), Berlin, Heidelberg, 2012, pp. 291-307. [5]Mario Frank, Ben Dong, Adrienne Porter-Felt, and Dawn Song. “Mining Permission Request Patterns from Android and Facebook Applications,”. In Proceedings of 2012 IEEE International Conference on Data Mining (ICDM 2012), 2012, pp. 870-875. [6]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, and X. Sean Wang, “AppIntent: analyzing sensitive data transmission in android for privacy leakage detection,”. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS’13), NY, USA, 2013, pp. 1043-1054. [7]Erika McCallister, Tim Grance, Karen Scarfone, “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII),” NIST Special Publication 800-122, 2010. [8]Murugiah Souppaya, Karen Scarfone, “Guidelines for Managing and Securing Mobile Devices in the Enterprise (Draft),” NIST Special Publication 800-124, 2012. [9]Personal Information Protection Act (Taiwan, R.O.C.), http://law.moj.gov.tw/LawClass/LawAll.aspx?PCode=I0050021, 2012. [10]Sanae Rosen, Zhiyun Qian, and Z. Morely Mao, “AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users,” In Proceedings of the third ACM conference on Data and application security and privacy (CODASPY '13), NY, USA, 2013, pp. 221-232. [11]Te-En Wei, A. B. Jeng, Hahn-Ming Lee, Chih-How Chen, Chin-Wei Tien, “Android Privacy,” In Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian, 15-17 July, 2012, pp. 1830-1837. [12]Takamasa Isohara, Keisuke Takemori and Ayumu Kubota, “Kernel-based Behavior Analysis for Android Malware Detection,” In Proceedings of the Seventh International Conference on Computational Intelligence and Security, 3-4 Dec, 2011, pp. 1011-1015. [13]Markus Tschersicha, Christian Kahla, Stephan Heima, Stephen Craneb, Katja Bottchera, Ioannis Krontirisa and Kai Rannenberga, “Towards privacy-enhanced mobile communities—Architecture, concepts and user trials,” The Journal of Systems and Software, vol. 84, 2011, pp. 1947-1960. [14]Welderufael Berhane Tesfay, Todd Booth, and Karl Andersson, “Reputation Based Security Model for Android Applications,” In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 896-901, 2012. [15]Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington, “Forensic analysis of social networking applications on mobile devices,” Digital Investigation, vol. 9, pp. 24-33, 2012. [16]Asaf Shabtai and Yuval Elovici, “Applying Behavioral Detection on Android-Based Devices,” Mobilware 2010, LNICST, vol. 48, 2010, pp. 235-249. [17]Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steven Hanna, and David Wagner, “A Survey of Mobile Malware in the Wild,” In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM’11), 2011, Illinois, USA, pp. 3-14. [18]Yacin Nadji, Jonathon Giffin, Patrick Trayno, “Automated remote repair for mobile malware,” In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11), 2011, pp. 413-422. [19]Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, “Crowdroid Behavior-Based Malware Detection System,” In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM’11), 2011, Illinois, USA, pp. 15-26. [20]Max Landman, “Managing Smart Phone Security Risks,” In Proceedings of the 2010 Information Security Curriculum Development Conference (InfoSecCD '10), 2010, pp. 145-155. [21]Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos, “Paranoid Android: versatile protection for smartphones,” In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10), 2010, pp. 347-356. [22]Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, Xuxian Jiang, “RiskRanker: scalable and accurate zero-day android malware detection,” In Proceedings of the 10th international conference on Mobile systems, applications, and services (MobiSys '12), 2012, pp. 281-294. [23]Cong Zheng, Shixiong Zhu, Shuaifu Dai, Guofei Gu, Xiaorui Gong, Xinhui Han, Wei Zou, “SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications,” In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices (SPSM '12), 2012, pp 93-94. [24]Naver corporation, http://www.navercorp.com/en/index.nhn [25]Weka: Data Mining Software in Java, http://www.cs.waikato.ac.nz/ml/weka/ [26]Stuart J Russell, Peter Norvig and Ernest Davis, Artificial intelligence: a modern approach, Prentice Hall, Upper Saddle River, NJ, USA, 2010.
|