Effects of Code Obfuscation on Android App Similarity Analysis
暂无分享,去创建一个
Seong-je Cho | Jonghwa Park | Sangchul Han | Minkyu Park | Hyojung Kim | Younsik Jeong | Seong-je Cho | Jonghwa Park | Minkyu Park | Sangchul Han | Younsik Jeong | Hyojung Kim
[1] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[2] Nasir D. Memon,et al. Preventing Piracy, Reverse Engineering, and Tampering , 2003, Computer.
[3] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[4] Christian S. Collberg,et al. K-gram based software birthmarks , 2005, SAC '05.
[5] Udi Manber,et al. Deducing Similarities in Java Sources from Bytecodes , 1998, USENIX Annual Technical Conference.
[6] Hugo Gonzalez,et al. Enriching reverse engineering through visual exploration of Android binaries , 2015, PPREW@ACSAC.
[7] Christian S. Collberg,et al. Detecting Software Theft via Whole Program Path Birthmarks , 2004, ISC.
[8] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[9] K.W. Bowyer,et al. Experience using "MOSS" to detect cheating on programming assignments , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.
[10] Florin Buzatu. Methods for Obfuscating Java Programs , 2012 .
[11] Seong-je Cho,et al. Measuring similarity of android applications via reversing and K-gram birthmarking , 2013, RACS.
[12] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[13] Akito Monden,et al. Design and evaluation of birthmarks for detecting theft of java programs , 2004, IASTED Conf. on Software Engineering.