Recommendable Schemes of Anti-decompilation for Android Applications
暂无分享,去创建一个
Dong Lin | Li Zhang | Junfeng Xu | Ye Mao
[1] Sébastien Salva,et al. Data vulnerability detection by security testing for Android applications , 2013, 2013 Information Security for South Africa.
[2] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[3] Xiapu Luo,et al. RootGuard: Protecting Rooted Android Phones , 2014, Computer.
[4] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[5] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[6] Richard Bloss,et al. Unmanned vehicles while becoming smaller and smarter are addressing new applications in medical, agriculture, in addition to military and security , 2014, Ind. Robot.
[7] Karl Andersson,et al. Reputation Based Security Model for Android Applications , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[9] Tao Zhang,et al. Security Analysis and Protection Based on Smali Injection for Android Applications , 2014, ICA3PP.
[10] Shunxiang Wu,et al. Phones' private data protection and synchronization based on Android OS , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.
[11] Connie M. Borror,et al. Robustness of the Markov-chain model for cyber-attack detection , 2004, IEEE Transactions on Reliability.
[12] Ana R. Cavalli,et al. Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.
[13] Ki-Cheol Son,et al. The method of android application speed up by using NDK , 2011, 2011 3rd International Conference on Awareness Science and Technology (iCAST).
[14] Yang Chen,et al. A hidden Markov model detection of malicious Android applications at runtime , 2014, 2014 23rd Wireless and Optical Communication Conference (WOCC).
[15] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[16] Jianye Liu,et al. Research on Development of Android Applications , 2011, 2011 4th International Conference on Intelligent Networks and Intelligent Systems.
[17] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[18] T. Y. Chen,et al. Dynamic program dicing , 1993, 1993 Conference on Software Maintenance.
[19] Somesh Jha,et al. Retargeting Android applications to Java bytecode , 2012, SIGSOFT FSE.
[20] Tianzhou Chen,et al. The Android Application Development College Challenge , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.
[21] Juanru Li,et al. Android App Protection via Interpretation Obfuscation , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.
[22] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.