Tackling runtime-based obfuscation in Android with TIRO
暂无分享,去创建一个
[1] Valerio Costamagna,et al. ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime , 2016, IMPS@ESSoS.
[2] Petar Tsankov,et al. Statistical Deobfuscation of Android Applications , 2016, CCS.
[3] Laurie Hendren,et al. Soot: a Java bytecode optimization framework , 2010, CASCON.
[4] Somesh Jha,et al. Retargeting Android applications to Java bytecode , 2012, SIGSOFT FSE.
[5] David Lie,et al. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware , 2016, NDSS.
[6] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[7] Xiapu Luo,et al. DexHunter: Toward Extracting Hidden Code from Packed Android Applications , 2015, ESORICS.
[8] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[9] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[10] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[11] Christopher Krügel,et al. TriggerScope: Towards Detecting Logic Bombs in Android Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[12] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[13] John C. S. Lui,et al. TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime , 2016, CCS.
[14] Alexander Pretschner,et al. Code obfuscation against symbolic execution attacks , 2016, ACSAC.
[15] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[16] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[17] Mu Zhang,et al. Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation , 2018, NDSS.
[18] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[19] Yifei Zhang,et al. Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments , 2017, CODASPY.
[20] Xue Liu,et al. Effective Real-Time Android Application Auditing , 2015, 2015 IEEE Symposium on Security and Privacy.
[21] Mira Mezini,et al. Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[22] Lei Xue,et al. Adaptive Unpacking of Android Apps , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE).
[23] Michael Pradel,et al. Making Malory Behave Maliciously: Targeted Fuzzing of Android Execution Environments , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE).
[24] Mahmoud M. Hammad,et al. Obfuscation-Resilient , Efficient , and Accurate Detection and Family Identification of Android Malware , 2015 .
[25] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[26] Juanru Li,et al. AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware , 2015, RAID.
[27] Fabio Massacci,et al. StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications , 2015, CODASPY.
[28] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[29] Eric Bodden,et al. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques , 2016, NDSS.
[30] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).