An Effective Android Software Reinforcement Scheme Based on Online Key
暂无分享,去创建一个
Li Zhang | Junfeng Xu | Ye Mao | Luo Yang | Xiaolong Shi
[1] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[2] Tilo Müller,et al. Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[3] Julian Schütte,et al. ConDroid: Targeted Dynamic Analysis of Android Applications , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[4] John C. S. Lui,et al. DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[5] Ross J. Anderson,et al. Aurasium: Practical Policy Enforcement for Android Applications , 2012, USENIX Security Symposium.
[6] Dong Lin,et al. Recommendable Schemes of Anti-decompilation for Android Applications , 2015, 2015 Ninth International Conference on Frontier of Computer Science and Technology.
[7] Juanru Li,et al. Android App Protection via Interpretation Obfuscation , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.
[8] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[9] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.