AppIS: Protect Android Apps Against Runtime Repackaging Attacks
暂无分享,去创建一个
Zhen Li | Xiaojiang Chen | Lina Song | Dingyi Fang | Zhanyong Tang | Xiaoqing Gong | Zheng Wang | Z. Li | Xiaojiang Chen | Dingyi Fang | Z. Wang | Zhanyong Tang | Xiaoqing Gong | Lina Song
[1] Christian S. Collberg,et al. Toward Digital Asset Protection , 2011, IEEE Intelligent Systems.
[2] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Daniele Sgandurra,et al. Detection of repackaged mobile applications through a collaborative approach , 2015, Concurr. Comput. Pract. Exp..
[4] Muhammad Mubashir Khan,et al. Signature-based detection of privilege-escalation attacks on Android , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).
[5] Yajin Zhou,et al. Fast, scalable detection of "Piggybacked" mobile applications , 2013, CODASPY.
[6] Andy King,et al. Partial evaluation of string obfuscations for Java malware detection , 2016, Formal Aspects of Computing.
[7] Hao Chen,et al. Attack of the Clones: Detecting Cloned Applications on Android Markets , 2012, ESORICS.
[8] Vijay Laxmi,et al. AndroSimilar: Robust signature for detecting variants of Android malware , 2015, J. Inf. Secur. Appl..
[9] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Qi Li,et al. A control flow obfuscation method for Android applications , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).
[11] Ting-Wei Hou,et al. Tamper-proofing basis path by using oblivious hashing on Java , 2007, SIGP.
[12] Ramarathnam Venkatesan,et al. Oblivious Hashing: A Stealthy Software Integrity Verification Primitive , 2002, Information Hiding.
[13] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[14] Zhiyuan Wang,et al. Android malware analytic method based on improved multi-level signature matching , 2015, 2015 5th International Conference on Information Science and Technology (ICIST).
[15] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[16] Ramarathnam Venkatesan,et al. Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings , 2007, MM&Sec.
[17] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[18] Thomas Schreck,et al. Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.
[19] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[20] Xuxian Jiang,et al. A Static Assurance Analysis of Android Applications , 2013 .