TY - STD TI - Google Play: number of downloads 2010-2016 | Statistic. https://www.statista.com/statistics/281106/number-of-android-app-downloads-from-google-play/. Accessed Jan 2019. UR - https://www.statista.com/statistics/281106/number-of-android-app-downloads-from-google-play/ ID - ref1 ER - TY - STD TI - Global smartphone shipments by OS 2016-2021 | Statistic. https://www.statista.com/statistics/309448/global-smartphone-shipments-forecast-operating-system/. Accessed Feb 2019. UR - https://www.statista.com/statistics/309448/global-smartphone-shipments-forecast-operating-system/ ID - ref2 ER - TY - STD TI - McAfee Labs Threats Predictions Report | McAfee Labs. https://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-mar-2016.pdf. Accessed Feb 2019. UR - https://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-mar-2016.pdf ID - ref3 ER - TY - STD TI - J. Oberheide, C. Miller. Dissecting the Android Bouncer. SummerCon2012 (New York, 2012), p. 110. ID - ref4 ER - TY - STD TI - M. Linares-Vàsquez, K. Moran, D. Poshyvanyk, in 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). Continuous, evolutionary and large-scale: A new perspective for automated mobile app testing, (2017), pp. 399–410. https://doi.org/10.1109/ICSME.2017.27. ID - ref5 ER - TY - STD TI - S. R. Choudhary, A. Gorla, A. Orso, in In 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE). Automated test input generation for android: Are we there yet? (IEEE, 2015), pp. 429–440. ID - ref6 ER - TY - STD TI - M. K. Alzaylaee, S. Y. Yerima, S. Sezer, in 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). Improving dynamic analysis of android apps using hybrid test input generation, (2017), pp. 1–8. https://doi.org/10.1109/CyberSecPODS.2017.8074845. ID - ref7 ER - TY - STD TI - M. K. Alzaylaee, S. Y. Yerima, S. Sezer, in 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). Dynalog: an automated dynamic analysis framework for characterizing android applications, (2016), pp. 1–8. https://doi.org/10.1109/CyberSecPODS.2016.7502337. ID - ref8 ER - TY - STD TI - APIMonitor. https://github.com/pjlantz/droidbox/wiki/APIMonitor. Accessed Sept 2018. UR - https://github.com/pjlantz/droidbox/wiki/APIMonitor ID - ref9 ER - TY - CHAP AU - Alzaylaee, M. K. AU - Yerima, S. Y. AU - Sezer, S. PY - 2017 DA - 2017// TI - Emulator vs real phone: Android malware detection using machine learning BT - Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics. IWSPA ’17 PB - ACM CY - Scottsdale ID - Alzaylaee2017 ER - TY - STD TI - T. Bläsing, L. Batyuk, A. D. Schmidt, S. A. Camtepe, S. Albayrak, in 2010 5th International Conference on Malicious and Unwanted Software. An android application sandbox system for suspicious software detection, (2010), pp. 55–62. https://doi.org/10.1109/MALWARE.2010.5665792. ID - ref11 ER - TY - STD TI - T. Eder, M. Rodler, D. Vymazal, M. Zeilinger, in 2013 International Conference on Availability, Reliability and Security. Ananas - a framework for analyzing android applications, (2013), pp. 711–719. https://doi.org/10.1109/ARES.2013.93. ID - ref12 ER - TY - CHAP AU - Spreitzenbarth, M. AU - Freiling, F. AU - Echtler, F. AU - Schreck, T. AU - Hoffmann, J. PY - 2013 DA - 2013// TI - Mobile-sandbox: having a deeper look into android applications BT - Proceedings of the 28th Annual ACM Symposium on Applied Computing. SAC ’13 PB - ACM CY - New York UR - https://doi.org/10.1145/2480362.2480701 DO - 10.1145/2480362.2480701 ID - Spreitzenbarth2013 ER - TY - CHAP AU - Zhang, Y. AU - Yang, M. AU - Xu, B. AU - Yang, Z. AU - Gu, G. AU - Ning, P. AU - Wang, X. S. AU - Zang, B. PY - 2013 DA - 2013// TI - Vetting undesirable behaviors in android apps with permission use analysis BT - Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security. CCS ’13 PB - ACM CY - New York ID - Zhang2013 ER - TY - STD TI - UI/Application Exerciser Monkey (2017). https://developer.android.com/studio/test/monkey.html. Accessed Sept 2018. UR - https://developer.android.com/studio/test/monkey.html ID - ref15 ER - TY - CHAP AU - Amalfitano, D. AU - Fasolino, A. R. AU - Tramontana, P. AU - De Carmine, S. AU - Memon, A. M. PY - 2012 DA - 2012// TI - Using GUI ripping for automated testing of android applications BT - Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. ASE 2012 PB - ACM CY - New York ID - Amalfitano2012 ER - TY - STD TI - W. Yang, M. R. Prasad, T. Xie, in Fundamental Approaches to Software Engineering. FASE 2013. Lecture Notes in Computer Science, Vol. 7793, ed. by Cortellessa V., Varró D.A grey-box approach for automated GUI-model generation of mobile applications (SpringerBerlin, 2013), pp. 250–265. ID - ref17 ER - TY - JOUR AU - Azim, T. AU - Neamtiu, I. PY - 2013 DA - 2013// TI - Targeted and depth-first exploration for systematic testing of android apps JO - SIGPLAN Not. VL - 48 UR - https://doi.org/10.1145/2544173.2509549 DO - 10.1145/2544173.2509549 ID - Azim2013 ER - TY - CHAP AU - Choi, W. AU - Necula, G. AU - Sen, K. PY - 2013 DA - 2013// TI - Guided GUI testing of android apps with minimal restart and approximate learning BT - Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications (OOPSLA ’13) PB - ACM CY - New York UR - https://doi.org/10.1145/2509136.2509552 DO - 10.1145/2509136.2509552 ID - Choi2013 ER - TY - CHAP AU - Hao, S. AU - Liu, B. AU - Nath, S. AU - Halfond, W. G. AU - Govindan, R. PY - 2014 DA - 2014// TI - Puma: Programmable UI-automation for large-scale dynamic analysis of mobile apps BT - Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’14) PB - ACM CY - New York ID - Hao2014 ER - TY - STD TI - Y. Li, Z. Yang, Y. Guo, X. Chen, in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C). Droidbot: a lightweight UI-guided test input generator for android, (2017), pp. 23–26. https://doi.org/10.1109/ICSE-C.2017.8. ID - ref21 ER - TY - STD TI - Z. Yajin, J. Xuxian, Android Malware Genome Project. http://www.malgenomeproject.org/. Accessed Sept 2018. UR - http://www.malgenomeproject.org/ ID - ref22 ER - TY - STD TI - L. Santoku. https://santoku-linux.com/. Accessed July 2018. UR - https://santoku-linux.com/ ID - ref23 ER - TY - STD TI - D. Arp, M. Spreitzenbarth, H. Malte, H. Gascon, K. Rieck, Drebin: effective and explainable detection of Android malware in your pocket. Symposium on Network and Distributed System Security (NDSS) (February), 23–26 (2014). https://doi.org/10.14722/ndss.2014.23247. ID - ref24 ER - TY - JOUR AU - Aafer, Y. AU - Du, W. AU - Yin, H. PY - 2013 DA - 2013// TI - DroidAPIMiner: mining API-level features for robust malware detection in Android JO - Security and Privacy in Communication Networks VL - 127 UR - https://doi.org/10.1007/978-3-319-04283-1_6 DO - 10.1007/978-3-319-04283-1_6 ID - Aafer2013 ER - TY - CHAP AU - Yerima, S. Y. AU - Sezer, S. AU - Muttik, I. PY - 2015 DA - 2015// TI - Android malware detection: an eigenspace analysis approach BT - Science and Information Conference (SAI), 2015 PB - IEEE CY - London UR - https://doi.org/10.1109/SAI.2015.7237302 DO - 10.1109/SAI.2015.7237302 ID - Yerima2015 ER - TY - JOUR AU - Fan, M. AU - Liu, J. AU - Wang, W. AU - Li, H. AU - Tian, Z. AU - Liu, T. PY - 2017 DA - 2017// TI - Dapasa: detecting android piggybacked apps through sensitive subgraph analysis JO - IEEE Trans. Inf. Forensics Secur. VL - 12 UR - https://doi.org/10.1109/TIFS.2017.2687880 DO - 10.1109/TIFS.2017.2687880 ID - Fan2017 ER - TY - JOUR AU - Yerima, S. Y. AU - Sezer, S. AU - Muttik, I. PY - 2015 DA - 2015// TI - High accuracy android malware detection using ensemble learning JO - IET Inf. Secur. VL - 9 UR - https://doi.org/10.1049/iet-ifs.2014.0099 DO - 10.1049/iet-ifs.2014.0099 ID - Yerima2015 ER - TY - STD TI - B. Kang, S. Y. Yerima, S. Sezer, K. McLaughlin, N-gram opcode analysis for android malware detection. CoRR. abs/1612.01445: (2016). http://arxiv.org/abs/1612.01445. ID - ref29 ER - TY - JOUR AU - Cen, L. AU - Gates, C. S. AU - Si, L. AU - Li, N. PY - 2015 DA - 2015// TI - A probabilistic discriminative model for android malware detection with decompiled source code JO - IEEE Trans. Dependable Secure Comput. VL - 12 UR - https://doi.org/10.1109/TDSC.2014.2355839 DO - 10.1109/TDSC.2014.2355839 ID - Cen2015 ER - TY - STD TI - Westyarian, Y. Rosmansyah, B. Dabarsyah, in 2015 International Conference on Electrical Engineering and Informatics (ICEEI). Malware detection on android smartphones using api class and machine learning, (2015), pp. 294–297. https://doi.org/10.1109/ICEEI.2015.7352513. ID - ref31 ER - TY - STD TI - B. Kang, S. Y. Yerima, K. Mclaughlin, S. Sezer, in 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). N-opcode analysis for android malware classification and categorization, (2016), pp. 1–7. https://doi.org/10.1109/CyberSecPODS.2016.7502343. ID - ref32 ER - TY - STD TI - G. Suarez-Tangil, S. K. Dash, M. Ahmadi, J. Kinder, G. Giacinto, L. Cavallaro, in Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. Droidsieve: fast and accurate classification of obfuscated android malware (ACM, 2017), pp. 309–320. ID - ref33 ER - TY - JOUR AU - Yerima, S. Y. AU - Sezer, S. PY - 2018 DA - 2018// TI - Droidfusion: A novel multilevel classifier fusion approach for android malware detection JO - IEEE Trans. Cybern. VL - 49 UR - https://doi.org/10.1109/TCYB.2017.2777960 DO - 10.1109/TCYB.2017.2777960 ID - Yerima2018 ER - TY - JOUR AU - Enck, W. AU - Gilbert, P. AU - Chun, B. -. G. AU - Cox, L. P. AU - Jung, J. AU - McDaniel, P. AU - Sheth, A. N. PY - 2010 DA - 2010// TI - TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones JO - Osdi ’10 VL - 49 ID - Enck2010 ER - TY - STD TI - GoogleArchive DroidBox. https://code.google.com/archive/p/droidbox/. Accessed Jan 2019. UR - https://code.google.com/archive/p/droidbox/ ID - ref36 ER - TY - STD TI - K. Tam, S. J. Khan, A. Fattori, L. Cavallaro, CopperDroid: automatic reconstruction of android malware behaviors. Ndss (February), 8–11 (2015). https://doi.org/10.14722/ndss.2015.23145. ID - ref37 ER - TY - STD TI - V. Rastogi, Y. Chen, W. Enck, AppsPlayground : automatic security analysis of smartphone applications. CODASPY ’13 (3rd ACM conference on Data and Application Security and Privac), 209–220 (2013). https://doi.org/10.1145/2435349.2435379. ID - ref38 ER - TY - STD TI - Tracedroid. http://tracedroid.few.vu.nl/. Accessed Feb 2019. UR - http://tracedroid.few.vu.nl/ ID - ref39 ER - TY - STD TI - NVISO ApkScan - Scan Android applications for malware. https://apkscan.nviso.be/. Accessed Feb 2019. UR - https://apkscan.nviso.be/ ID - ref40 ER - TY - CHAP AU - Mahmood, R. AU - Mirzaei, N. AU - Malek, S. PY - 2014 DA - 2014// TI - Evodroid: segmented evolutionary testing of android apps BT - Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE 2014) PB - ACM CY - New York ID - Mahmood2014 ER - TY - CHAP AU - Mao, K. AU - Harman, M. AU - Jia, Y. PY - 2016 DA - 2016// TI - Sapienz: multi-objective automated testing for android applications BT - Proceedings of the 25th International Symposium on Software Testing and Analysis. ISSTA 2016 PB - ACM CY - New York UR - https://doi.org/10.1145/2931037.2931054 DO - 10.1145/2931037.2931054 ID - Mao2016 ER - TY - STD TI - N. Mirzaei, H. Bagheri, R. Mahmood, S. Malek, in 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE). Sig-droid: automated system input generation for android applications (IEEE, 2015), pp. 461–471. Gaithersbury, MD, https://doi.org/10.1109/ISSRE.2015.7381839. ID - ref43 ER - TY - STD TI - S. K. Dash, G. Suarez-Tangil, S. Khan, K. Tam, M. Ahmadi, J. Kinder, L. Cavallaro, in 2016 IEEE Security and Privacy Workshops (SPW). Droidscribe: classifying android malware based on runtime behavior (IEEE, 2016), pp. 252–261. ID - ref44 ER - TY - CHAP AU - Machiry, A. AU - Tahiliani, R. AU - Naik, M. PY - 2013 DA - 2013// TI - Dynodroid: an input generation system for android apps BT - Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering (ESEC/FSE 2013) PB - ACM CY - New York UR - https://doi.org/10.1145/2491411.2491450 DO - 10.1145/2491411.2491450 ID - Machiry2013 ER - TY - JOUR AU - Amalfitano, D. AU - Fasolino, A. R. AU - Tramontana, P. AU - Ta, B. D. AU - Memon, A. M. PY - 2015 DA - 2015// TI - Mobiguitar: automated model-based testing of mobile apps JO - IEEE Softw. VL - 32 UR - https://doi.org/10.1109/MS.2014.55 DO - 10.1109/MS.2014.55 ID - Amalfitano2015 ER - TY - CHAP AU - Anand, S. AU - Naik, M. AU - Harrold, M. J. AU - Yang, H. PY - 2012 DA - 2012// TI - Automated concolic testing of smartphone apps BT - Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering (FSE ’12) PB - ACM CY - New York ID - Anand2012 ER - TY - STD TI - V. Van Der Veen, H. Bos, C. Rossow, Dynamic analysis of android malware (2013). ID - ref48 ER - TY - STD TI - L. Weichselbaum, M. Neugschwandtner, M. Lindorfer, Y. Fratantonio, V van der Veen, C. Platzer. Andrubis: Android malware under the magnifying glass, (2014). Vienna University of Technology, Tech. Rep. TR-ISECLAB-0414- 001. ID - ref49 ER - TY - STD TI - L. Xu, D. Zhang, N. Jayasena, J. Cavazos, in Proceedings of SAI Intelligent Systems Conference (IntelliSys), ed. by Bi Y., Kapoor S., and Bhatia R.Hadm: Hybrid analysis for detection of malware (Springer, Cham, 2016). IntelliSys 2016. Lecture Notes in Networks and Systems, vol 16. ID - ref50 ER - TY - CHAP AU - Dimjašević, M. AU - Atzeni, S. AU - Ugrina, I. AU - Rakamaric, Z. PY - 2016 DA - 2016// TI - Evaluation of android malware detection based on system calls BT - Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics. IWSPA ’16 PB - ACM CY - New York ID - Dimjašević2016 ER - TY - STD TI - P. Irolla, E. Filiol, Glassbox: dynamic analysis platform for malware android applications on real devices. CoRR. abs/1609.04718: (2016). http://arxiv.org/abs/1609.04718. ID - ref52 ER - TY - STD TI - S. Dai, A. Tongaonkar, X. Wang, A. Nucci, D. Song, in 2013 Proceedings IEEE INFOCOM. Networkprofiler: towards automatic fingerprinting of android apps, (2013), pp. 809–817. https://doi.org/10.1109/INFCOM.2013.6566868. ID - ref53 ER - TY - STD TI - M. Bierma, E. Gustafson, J. Erickson, D. Fritz, Y. R. Choe, Andlantis: large-scale android dynamic analysis. CoRR. abs/1410.7751: (2014). http://arxiv.org/abs/1410.7751. ID - ref54 ER - TY - CHAP AU - Hu, C. AU - Neamtiu, I. PY - 2011 DA - 2011// TI - Automating gui testing for android applications BT - Proceedings of the 6th International Workshop on Automation of Software Test. AST ’11 PB - ACM CY - New York UR - https://doi.org/10.1145/1982595.1982612 DO - 10.1145/1982595.1982612 ID - Hu2011 ER - TY - STD TI - H. Cai, B. G. Ryder, V. Tech, Understanding Android application programming and security: a dynamic study. 1:, 1–12 (2017). https://doi.org/10.1109/ICSME.2017.31. ID - ref56 ER - TY - STD TI - M. Lindorfer, M. Neugschwandtner, in 2015 IEEE 39th Annual Computer Software and Applications Conference. Marvin: efficient and comprehensive mobile app classification through static and dynamic analysis (Taichung, 2015), pp. 422–433. https://doi.org/10.1109/COMPSAC.2015.103. ID - ref57 ER - TY - JOUR AU - Shabtai, A. AU - Kanonov, U. AU - Elovici, Y. AU - Glezer, C. AU - Weiss, Y. PY - 2012 DA - 2012// TI - “Andromaly”: a behavioral malware detection framework for android devices JO - J. Intell. Inf. Syst. VL - 38 UR - https://doi.org/10.1007/s10844-010-0148-x DO - 10.1007/s10844-010-0148-x ID - Shabtai2012 ER - TY - JOUR AU - Dini, G. AU - Martinelli, F. AU - Saracino, A. AU - Sgandurra, D. PY - 2012 DA - 2012// TI - MADAM: a multi-level anomaly detector for android malware JO - Lect. Notes Comput. Sci (Incl. subseries Lect. Notes Artif. Intell. Lect. Notes Bioinforma.) VL - 7531 LNCS ID - Dini2012 ER - TY - STD TI - H. Cai, N. Meng, B. Ryder, D. Yao, Droidcat : unified dynamic detection of android malware (2017). ID - ref60 ER - TY - STD TI - B. Amos, H. Turner, J. White, Applying machine learning classifiers to dynamic android malware detection at scale, (2013). https://doi.org/10.1109/IWCMC.2013.6583806. ID - ref61 ER - TY - JOUR AU - Spreitzenbarth, M. AU - Schreck, T. AU - Echtler, F. AU - Arp, D. AU - Hoffmann, J. PY - 2015 DA - 2015// TI - Mobile-sandbox: combining static and dynamic analysis with machine-learning techniques JO - Int. J. Inf. Secur. VL - 14 UR - https://doi.org/10.1007/s10207-014-0250-0 DO - 10.1007/s10207-014-0250-0 ID - Spreitzenbarth2015 ER - TY - STD TI - E. B. Karbab, M. Debbabi, S. Alrabaee, D. Mouheb, in 2016 11th International Conference on Malicious and Unwanted Software (MALWARE). Dysign: dynamic fingerprinting for the automatic detection of android malware, (2016), pp. 1–8. https://doi.org/10.1109/MALWARE.2016.7888739. ID - ref63 ER - TY - STD TI - L. Massarelli, L. Aniello, C. Ciccotelli, L. Querzoni, D. Ucci, R. Baldoni, Android malware family classification based on resource consumption over time (2017). ArXiv e-prints. http://arxiv.org/abs/1709.00875. ID - ref64 ER - TY - JOUR AU - Afonso, V. M. AU - de Amorim, M. F. AU - Grégio, A. R. A. AU - Junquera, G. B. AU - de Geus, P. L. PY - 2015 DA - 2015// TI - Identifying android malware using dynamically obtained features JO - J. Comput. Virol. Hacking Tech. VL - 11 UR - https://doi.org/10.1007/s11416-014-0226-7 DO - 10.1007/s11416-014-0226-7 ID - Afonso2015 ER -