Vision: alleviating Android developer burden on obfuscation
暂无分享,去创建一个
[1] Erik Derr,et al. Reliable Third-Party Library Detection in Android and its Security Applications , 2016, CCS.
[2] Patrick Traynor,et al. A Large Scale Investigation of Obfuscation Use in Google Play , 2018, ACSAC.
[3] Jian Liu,et al. Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild , 2018, SecureComm.
[4] Vrizlynn L. L. Thing,et al. Control flow obfuscation for Android applications , 2016, Comput. Secur..
[5] Felix C. Freiling,et al. An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs , 2014, SecureComm.
[6] Peng Liu,et al. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets , 2014, ICSE.
[7] Yan Wang,et al. Who Changed You? Obfuscator Identification for Android , 2017, 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft).
[8] Aleksandrina Kovacheva,et al. Efficient Code Obfuscation for Android , 2013, IAIT.
[9] Jiang Ming,et al. Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method , 2016, ISC.