The Research on Security Reinforcement of Android Applications
暂无分享,去创建一个
[1] Lei Zhang,et al. Towards a scalable resource-driven approach for detecting repackaged Android applications , 2014, ACSAC.
[2] John C. S. Lui,et al. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems , 2012, DIMVA.
[3] Barton P. Miller,et al. Binary-code obfuscations in prevalent packer tools , 2013, CSUR.
[4] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[5] Xiapu Luo,et al. On Tracking Information Flows through JNI in Android Applications , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[6] Yu Le,et al. VulHunter: Toward Discovering Vulnerabilities in Android Applications , 2015, IEEE Micro.
[7] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[8] Wenke Lee,et al. Classification of packed executables for accurate computer virus detection , 2008, Pattern Recognit. Lett..
[9] Sencun Zhu,et al. ViewDroid: towards obfuscation-resilient mobile application repackaging detection , 2014, WiSec '14.
[10] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).