1. [1] لسانی، فاطمه سادات، فتوحی، قزوینی فرانک، دیانت، روح الله، "لبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید"، مجله پردازش علائم و داده ها، جلد ۱۴، شماره ۱، صفحات ۳-۱۴، 1396.
2. [1] F. Sadat Lesani, F. Fotouhi Ghazvini, and R. Dianat, " Lip Reading: a New authentication method in Android mobile phone's applications," Journal of Signal and Data Processing, vol. 14, no. 1, pp. 3-14, 2017. [
DOI:10.18869/acadpub.jsdp.14.1.3]
3. [2] A. Armando, A. Merlo, and L. Verderame, "Security considerations related to the use of mobile devices in the operation of critical infrastructures," International Journal of Critical Infrastructure Protection, vol. 7, no. 4, pp. 247–256, 2014. [
DOI:10.1016/j.ijcip.2014.10.002]
4. [3] Y. Au, K. Wain, Y. F. Zhou, Z. Huang, and D. Lie, "PScout : Analyzing the Android Permission Specification," in CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security, 2012, pp. 217–228. [
DOI:10.1145/2382196.2382222]
5. [4] D. Barrera, H. G. üne ş Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android," in Proceedings of the 17th ACM conference on Computer and communications security - CCS '10, 2010, p. 73.
6. [5] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, "Crowdroid: Behavior-Based Malware Detection System for Android," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11, 2011, p. 15. [
DOI:10.1145/2046614.2046619]
7. [6] L. Cen, C. S. Gates, L. Si, and N. Li, "A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code," IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 4, pp. 400–412, 2015. [
DOI:10.1109/TDSC.2014.2355839]
8. [7] S. Chakradeo, B. Reaves, and W. Enck, "MAST: Triage for Market-scale Mobile Malware Analysis," in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2013, pp. 13–24. [
DOI:10.1145/2462096.2462100]
9. [8] E. Chin, A. P. Felt, V. Sekar, and D. Wagner, "Measuring user confidence in smartphone security and privacy," in Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12, 2012, p. 1. [
DOI:10.1145/2335356.2335358]
10. [9] M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," in Proceedings of the 1st conference on India software engineering conference - ISEC '08, 2008, p. 5. [
DOI:10.1145/1342211.1342215]
11. [10] A. Desnos, "Android: Static analysis using similarity distance," in Proceedings of the Annual Hawaii International Conference on System Sciences, 2011, no. X, pp. 5394–5403.
12. [11] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A Study of Android Application Security.," in USENIX Security, 2011, vol. 39, no. August, pp. 21–21.
13. [12] W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certifica-tion," in Proceedings of the 16th ACM conference on Computer and communications security - CCS '09, 2009, p. 235.
14. [13] A. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in WebApps '11: 2nd USENIX Conference on Web Application Development, 2011, pp. 75–86.
15. [14] A. Felt, E. Ha, S. Egelman, and A. Haney, "Android permissions: User attention, comprehension, and behavior," in Proc. of SOUPS, 2012, pp. 1–14. [
DOI:10.1145/2335356.2335360]
16. [15] C. S. Gates, J. Chen, N. Li, and R. W. Proctor, "Effective risk communication for Android apps," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 3, pp. 252–265, 2014. [
DOI:10.1109/TDSC.2013.58]
17. [16] C. S. Gates, N. Li, H. Peng, B. Sarma, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Generating summary risk scores for mobile applications," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 3, pp. 238–251, 2014. [
DOI:10.1109/TDSC.2014.2302293]
18. [17] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall, "A conundrum of permissions: Installing applications on an android smartphone," in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, vol. 7398 LNCS, pp. 68–79.
19. [18] P. G. Kelley, L. F. Cranor, and N. Sadeh, "Privacy as part of the app decision-making process," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13, 2013, p. 3393. [
DOI:10.1145/2470654.2466466]
20. [19] H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, I. Molloy, and I. Molloy, "Using Probabilistic Generative Models for Ranking Risks of Android Apps," Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 241–252, 2012. [
DOI:10.1145/2382196.2382224]
21. [20] K.Rieck, T. Holz, C. Willems, P. Dussel, and P. Laskov, " Learning and classification of malwa-re behavior, " in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008, vol. 5137 LNCS, pp. 108-125.
22. [21] B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-rotaru, and I. Molloy, "Android Permissions: A Perspective Combining Risks and Benefits," in Symposium on Access Control Models and Technologies (SACMAT), 2012, pp. 13–22. [
DOI:10.1145/2295136.2295141]
23. [22] A. D. Schmidt, R. Bye, H. G. Schmidt, J. Clausen, O. Kiraz, K. A. Yüksel, S. A. Camtepe, and S. Albayrak, "Static analysis of executables for collaborative malware detection on andr-oid," in IEEE International Conference on Communications, 2009.
24. [23] A. Shabtai and Y. Elovici, "Applying behavioral detection on android-based devices," in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2010, vol. 48 LNICST, pp. 235–249.
25. [24] B. Shebaro, O. Oluwatimi, and E. Bertino, "Context-based access control systems for mobile devices," IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 2, pp. 150–163, 2015. [
DOI:10.1109/TDSC.2014.2320731]
26. [25] Z. Tu, O. Turel, Y. Yuan, and N. Archer, "Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination," Information and Management, vol. 52, no. 4, pp. 506–517, 2015. [
DOI:10.1016/j.im.2015.03.002]
27. [26] Y. Zhou and X. Jiang, "Dissecting Android malware: Characterization and evolution," in Proceedings - IEEE Symposium on Security and Privacy, 2012, pp. 95–109. [
DOI:10.1109/SP.2012.16]
28. [27] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets," in Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012, no. 2, pp. 5–8.
29. [28] H. Zhu, H. Xiong, Y. Ge, and E. Chen, "Discovery of ranking fraud for mobile apps," IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 1, pp. 74–87, 2015. [
DOI:10.1109/TKDE.2014.2320733]