|
[1] Number of smartphone users worldwide from 2014 to 2020 (in billions). https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/, 2017. [2] Mobile operating system market share worldwide from november 2016 to november 2017. http://gs.statcounter.com/os-market-share/mobile/worldwide/, 2017. [3] Another reason 99% of mobile malware targets androids. https://safeandsavvy.f-secure.com/2017/02/15/another-reason-99-percent-of-mobile-malware-targets-androids/, 2017. [4] Android platform versions (data collected during a 7-day period ending on december 11, 2017.). https://developer.android.com/about/dashboards/index.html#Screens, 2017. [5] Hon Lau Kevin Savage, Peter Coogan. The evolution of ransomware. Symantec, 1st edition, 2015. [6] Ransomware victims have paid out more than $25 million. https://www.theverge.com/2017/7/25/16023920/ransomware-statistics-locky-cerber-google-research, 2017. [7] Apktool. https://ibotpeaches.github.io/Apktool/install, 2017. [8] dex2jar - tools to work with android .dex and java .class files. https://sourceforge.net/projects/dex2jar, 2016. [9] Java decompiler - yet another fast java decompiler. http://jd.benow.ca, 2017. [10] Proguard - the open source optimizer for java bytecode. https://www.guardsquare.com/en/proguard, 2017. [11] Francesco Mercaldo Davide Maiorca and Giorgio Giacinto. R-packdroid: Api package-based characterization and detection of mobile ransomware. In SAC, pages 1718–1723, 2017. [12] Antonella Santone Francesco Mercaldo, Vittoria Nardone and Corrado Aaron Visaggio. Ransomware steals your phone. formal methods rescue it. In Formal Techniques for Distributed Objects, Components, and Systems, volume 9688, pages 212–221. Springer, 2016. [13] Stefano Zanero Nicolo Andronio and Federico Maggi. Heldroid: Dissecting and detecting mobile ransomware. In Research in Attacks, Intrusions, and Defenses, pages 382–404. RAID, 2015. [14] Kai Qian Tianda Yang, Yu Yang and Dan Cia-Tien Lo. Automated detection and analysis for android ransomware. In IEEE 7th International Symposium on CSS, pages 1338–1343. IEEE, 2015. [15] Amirhossein Gharib and Ali Ghorbani. Dna-droid: A real-time android ransomware detection framework. In Network and System Security, volume 10394, pages 184–198. Springer, 2017. [16] Bongjoon Kim Sanggeun Song and Sangjun Lee. The effective ransomware prevention technique using process monitoring on android platform. In Mobile Information Systems, pages 3–11. Hindawi, 2016. [17] Patrick Traynor Nolen Scaife, Henry Carter and Kevin R.B. Butler. Cryptolock and drop it: Stopping ransomware attacks on user data. In IEEE 36th International Conference on ICDCS, pages 303–312. IEEE, 2016. [18] Android developers - fileobserver. https://developer.android.com/reference/android/os/FileObserver.html, 2017. [19] Wikipedia - inotify. https://en.wikipedia.org/wiki/Inotify, 2017. [20] Mobile ransomware: Pocket-sized badness. http:// blog.trendmicro.com/trendlabs-security-intelligence/ mobile-ransomware-pocket-sized-badness/, 2016. [21] Contagio - malware dump. http://contagiodump.blogspot.tw/, 2017. [22] Virusshare.com - because sharing is caring. https://virusshare.com/, 2017. [23] List of most downloaded android applications. https://en.wikipedia.org/wiki/List_of_most_downloaded_Android_applications, 2017. [24] Measure app performance with android profiler. https://developer. android.com/studio/profile/android-profiler.html, 2017. [25] Google play - antutu. https://play.google.com/store/apps/details?id= com.antutu.ABenchMark&hl=zh_TW, 2017. |