메뉴 건너뛰기




Volumn 7159 LNCS, Issue , 2012, Pages 106-120

Plagiarizing smartphone applications: Attack strategies and defense techniques

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK STRATEGIES; DATA SETS; DEFENSE TECHNIQUES; DETECTION SCHEME; FALSE POSITIVE; INFECTION RATES; MALWARES; META INFORMATION; SOCIAL ENGINEERING;

EID: 84863138661     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28166-2_11     Document Type: Conference Paper
Times cited : (47)

References (30)
  • 8
    • 79959868798 scopus 로고    scopus 로고
    • Taint-Droid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taint-Droid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI (2010)
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.3    Cox, L.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 9
    • 84863116972 scopus 로고    scopus 로고
    • Apex: Extending Android Permission Model with user-defined runtime constraints
    • Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android Permission Model with user-defined runtime constraints. In: ICCS (2010)
    • (2010) ICCS
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 10
    • 85091899871 scopus 로고    scopus 로고
    • Retroactive detection of malware with applications to mobile platforms
    • Jakobsson, M., Johansson, K.: Retroactive detection of malware with applications to mobile platforms. In: HotSec (2010)
    • (2010) HotSec
    • Jakobsson, M.1    Johansson, K.2
  • 11
    • 84885884258 scopus 로고    scopus 로고
    • Google Android, http://code.google.com/android
    • Google Android
  • 14
    • 19744369998 scopus 로고    scopus 로고
    • Lafortune, E., et al.: ProGuard (2004), http://proguard.sourceforge.net
    • (2004) ProGuard
    • Lafortune, E.1
  • 15
    • 14344262813 scopus 로고    scopus 로고
    • Obfuscation of executable code to improve resistance to static disassembly
    • Linn, C., Debray, S.K.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS (2003)
    • (2003) CCS
    • Linn, C.1    Debray, S.K.2
  • 16
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
    • Collberg, C.S., Thomborson, C.D.: Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. In: IEEE TSE (2002)
    • (2002) IEEE TSE
    • Collberg, C.S.1    Thomborson, C.D.2
  • 18
    • 84863157623 scopus 로고    scopus 로고
    • Treemaps for space-constrained visualization of hierarchies
    • Shneiderman, B.: Treemaps for space-constrained visualization of hierarchies. In: ACM TOG (1998)
    • (1998) ACM TOG
    • Shneiderman, B.1
  • 19
    • 84863157622 scopus 로고    scopus 로고
    • de-Dexer, http://dedexer.sourceforge.net
    • de-Dexer
  • 20
    • 84863174181 scopus 로고    scopus 로고
    • dex2jar, http://code.google.com/p/dex2jar/
    • Dex2jar
  • 21
    • 67650139576 scopus 로고    scopus 로고
    • Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection
    • Chechik, M., Wirsing, M. (eds.) FASE 2009. Springer, Heidelberg
    • Nguyen, H., Nguyen, T., Pham, N., Al-Kofahi, J., Nguyen, T.: Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection. In: Chechik, M., Wirsing, M. (eds.) FASE 2009. LNCS, vol. 5503, pp. 440-455. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5503 , pp. 440-455
    • Nguyen, H.1    Nguyen, T.2    Pham, N.3    Al-Kofahi, J.4    Nguyen, T.5
  • 23
    • 0032201716 scopus 로고    scopus 로고
    • An optimal algorithm for approximate nearest neighbor search in fixed dimensions
    • Arya, S., Mount, D., Netanyahu, N., Silverman, R., Wu, A.: An optimal algorithm for approximate nearest neighbor search in fixed dimensions. JACM (1998)
    • (1998) JACM
    • Arya, S.1    Mount, D.2    Netanyahu, N.3    Silverman, R.4    Wu, A.5
  • 24
    • 34548767669 scopus 로고    scopus 로고
    • Deckard: Scalable and accurate tree-based detection of code clones
    • IEEE Computer Society
    • Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate tree-based detection of code clones. In: ICSE. IEEE Computer Society (2007)
    • (2007) ICSE
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 25
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
    • Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. In: IEEE TSE (2006)
    • (2006) IEEE TSE
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 26
    • 15844362342 scopus 로고    scopus 로고
    • A Differencing Algorithm for Object-Oriented Programs
    • Apiwattanapong, T., Orso, A., Harrold, M.: A Differencing Algorithm for Object-Oriented Programs. In: ASE (2004)
    • (2004) ASE
    • Apiwattanapong, T.1    Orso, A.2    Harrold, M.3
  • 27
    • 85018098984 scopus 로고
    • Semantic Diff: A Tool for Summarizing the Effects of Modifications
    • Jackson, D., Ladd, D.: Semantic Diff: A Tool for Summarizing the Effects of Modifications. In: ICSM (1994)
    • (1994) ICSM
    • Jackson, D.1    Ladd, D.2
  • 28
    • 84981570490 scopus 로고
    • Identification of Program Modifications and its Applications to Software Maintenance
    • Laski, J., Szermer,W.: Identification of Program Modifications and its Applications to Software Maintenance. In: ICSM (1992)
    • (1992) ICSM
    • Laski, J.1    Szermer, W.2
  • 30
    • 0033717004 scopus 로고    scopus 로고
    • Semantics-Preserving Procedure Extraction
    • Komondoor, R., Horwitz, S.: Semantics-Preserving Procedure Extraction. In: POPL (2000)
    • (2000) POPL
    • Komondoor, R.1    Horwitz, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.