Author:
Yun Xinyu,Zhu Zesheng,Fang Liming,Zhang Aiping
Publisher
Springer Nature Singapore
Reference17 articles.
1. Zhao, Zh.B., Fernando, C., Colón, O.: TrustDroid: preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking. Malware 135–143 (2012)
2. Wu, S.Y., Wang, P., Li, X., Zhang, Y.: Effective detection of android malware based on the usage of data flow APIs and machine learning. Inf. Softw. Technol. 75, 17–25 (2016)
3. Fu, J.M., Liu, X.W., Cheng, B.L.: Malware behavior capturing based on taint propagation and stack. Backtracing TrustCom 2011, 328–335 (2011)
4. Kimmell, J.C., McDole, A., Abdelsalam, M., Gupta, M., Sandhu, R.S.: Recurrent neural networks based online behavioural malware detection techniques for cloud infrastructure. IEEE Access 9, 68066–68080 (2021)
5. Deng, L., Zeng, Q.K.: Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware. IET Inf. Secur. 10(6), 418–424 (2016)