Author:
Niu Weina,Zhang Xiaosong,Yan Ran,Gong Jiacheng
Publisher
Springer Nature Singapore
Reference12 articles.
1. Afianian A, Niksefat S, Sadeghiyan B, et al. Malware dynamic analysis evasion techniques: A survey[J]. ACM Computing Surveys (CSUR), 2019, 52(6): 1–28.
2. Vidas T, Christin N. Evading android runtime analysis via sandbox detection[C]//Proceedings of the 9th ACM symposium on Information, computer and communications security. 2014: 447–458.
3. Yokoyama A, Ishii K, Tanabe R, et al. Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion[C]//International Symposium on Research in Attacks, Intrusions, and Defenses. Springer, Cham, 2016: 165–187.
4. Diao W, Liu X, Li Z, et al. Evading android runtime analysis through detecting programmed interactions[C]//Proceedings of the 9th ACM conference on security & privacy in wireless and mobile networks. 2016: 159–164.
5. Miramirkhani N, Appini M P, Nikiforakis N, et al. Spotless sandboxes: Evading malware analysis systems using wear-and-tear artifacts[C]//2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017: 1009–1024.