Google (2014). Apktool. https:code.google.compandroid-
apktool Access time: 2016, May.
Grace, M. C., Zhou, Y., Wang, Z., and Jiang, X. (2012).
Systematic detection of capability leaks in stock an-
droid smartphones. In Proceedings of the Network
and Distributed System Security Symposium (NDSS),
volume 14, page 19. Internet Society.
Hoffmann, J., Ussath, M., Holz, T., and Spreitzenbarth,
M. (2013). Slicing droids: program slicing for smali
code. In Proceedings of the 28th Annual ACM Sympo-
sium on Applied Computing, pages 1844–1851. ACM.
IDC (2014). Android and ios continue to domi-
nate the worldwide smartphone market with an-
droid shipments just shy of 800 million in 2013.
http://www.idc.com/getdoc.jsp Access time: February
2014.
ISBX (2014). An online data set of malwares.
http://www.unb.ca/research/iscx/dataset/ Access time:
2015, May.
Jeon, J., Micinski, K. K., Vaughan, J. A., Fogel, A., Reddy,
N., Foster, J. S., and Millstein, T. (2012). Dr. android
and mr. hide: fine-grained permissions in android ap-
plications. In Proceedings of the second ACM work-
shop on Security and privacy in smartphones and mo-
bile devices, pages 3–14. ACM.
Karami, M., Elsabagh, M., Najafiborazjani, P., and Stavrou,
A. (2013). Behavioral analysis of android applications
using automated instrumentation. In Proceedings of
the IEEE 7th International Conference on Software
Security and Reliability-Companion (SERE-C), pages
182–187. IEEE.
Li, L., Bartel, A., Bissyand
´
e, T. F., Klein, J., and Le Traon,
Y. (2015). Apkcombiner: Combining multiple an-
droid apps to support inter-app analysis. In Proceed-
ings of the IFIP International Information Security
Conference, pages 513–527. Springer.
Peiravian, N. and Zhu, X. (2013). Machine learning for
android malware detection using permission and api
calls. In Proceedings of the IEEE 25th International
Conference on Tools with Artificial Intelligence, pages
300–305. IEEE.
Pooryousef, S. and Amini, M. (2016). Fine-grained ac-
cess control for hybrid mobile applications in android
using restricted paths. In Information Security and
Cryptology (ISCISC), 2016 13th International Iranian
Society of Cryptology Conference on, pages 85–90.
IEEE.
Rastogi, V., Chen, Y., and Enck, W. (2013). Appsplay-
ground: automatic security analysis of smartphone ap-
plications. In Proceedings of the 3rd ACM conference
on Data and application security and privacy, pages
209–220. ACM.
Rastogi, V., Chen, Y., and Jiang, X. (2014). Catch me if you
can: Evaluating android anti-malware against trans-
formation attacks. In IEEE Transactions on Informa-
tion Forensics and Security, volume 9, pages 99–108.
IEEE.
Report, M. T. (2014). Third quarter 2012.
http://www.mcafee.com/ca/resources/reports/rp-
quarterly-threat-q3-2012.pdf Access time: May 7,
2013.
Sahs, J. and Khan, L. (2012). A machine learning ap-
proach to android malware detection. In Proceedings
of the Intelligence and Security Informatics Confer-
ence (EISIC), 2012 European, pages 141–147. IEEE.
Tam, K., Khan, S. J., Fattori, A., and Cavallaro, L. (2015).
Copperdroid: Automatic reconstruction of android
malware behaviors. In Proceedings of the Network
and Distributed System Security Symposium (NDSS).
Internet Society.
VirusShare (2014). An online data set of malwares.
https:virusshare.com Access time: 2015, May.
Wong, M. Y. and Lie, D. (2016). Intellidroid: A targeted
input generator for the dynamic analysis of android
malware. In Proceedings of the Annual Symposium
on Network and Distributed System Security (NDSS),
pages 1–15. The Internet Society.
Xu, R., Sa
¨
ıdi, H., and Anderson, R. (2012). Aurasium:
Practical policy enforcement for android applications.
In Proceedings of the 21st USENIX Security Sympo-
sium (USENIX Security 12), pages 539–552. USENIX
Association.
Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., and Enck,
W. (2015). Appcontext: Differentiating malicious and
benign mobile app behaviors using context. In 37th
IEEE International Conference on Software Engineer-
ing, volume 1, pages 303–313. IEEE.
Zhang, Y., Yang, M., Xu, B., Yang, Z., Gu, G., Ning, P.,
Wang, X. S., and Zang, B. (2013). Vetting undesir-
able behaviors in android apps with permission use
analysis. In Proceedings of the ACM SIGSAC confer-
ence on Computer & communications security, pages
611–622. ACM.
Zheng, C., Zhu, S., Dai, S., Gu, G., Gong, X., Han, X., and
Zou, W. (2012a). Smartdroid: an automatic system for
revealing ui-based trigger conditions in android appli-
cations. In Proceedings of the 2nd ACM workshop on
Security and privacy in smartphones and mobile de-
vices, pages 93–104. ACM.
Zheng, M., Lee, P. P., and Lui, J. C. (2012b). Adam: an
automatic and extensible platform to stress test an-
droid anti-virus systems. In International Conference
on Detection of Intrusions and Malware, and Vulner-
ability Assessment, pages 82–101. Springer.
Zhou, W., Zhang, X., and Jiang, X. (2013). Appink: water-
marking android apps for repackaging deterrence. In
Proceedings of the 8th ACM SIGSAC symposium on
Information, computer and communications security,
pages 1–12. ACM.
Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. (2012a). Hey,
you, get off of my market: Detecting malicious apps in
official and alternative android markets. In Proceed-
ings of the Network and Distributed System Security
Symposium (NDSS), volume 25, pages 50–52.
Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. (2012b). Hey,
you, get off of my market: Detecting malicious apps in
official and alternative android markets. In Proceed-
ings of the Network and Distributed System Security
Symposium (NDSS), volume 25, pages 50–52.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
388