-
8
-
-
79959868798
-
Taint-Droid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taint-Droid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI (2010)
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
9
-
-
84863116972
-
Apex: Extending Android Permission Model with user-defined runtime constraints
-
Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android Permission Model with user-defined runtime constraints. In: ICCS (2010)
-
(2010)
ICCS
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
10
-
-
85091899871
-
Retroactive detection of malware with applications to mobile platforms
-
Jakobsson, M., Johansson, K.: Retroactive detection of malware with applications to mobile platforms. In: HotSec (2010)
-
(2010)
HotSec
-
-
Jakobsson, M.1
Johansson, K.2
-
11
-
-
84885884258
-
-
Google Android, http://code.google.com/android
-
Google Android
-
-
-
14
-
-
19744369998
-
-
Lafortune, E., et al.: ProGuard (2004), http://proguard.sourceforge.net
-
(2004)
ProGuard
-
-
Lafortune, E.1
-
15
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
Linn, C., Debray, S.K.: Obfuscation of executable code to improve resistance to static disassembly. In: CCS (2003)
-
(2003)
CCS
-
-
Linn, C.1
Debray, S.K.2
-
16
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
-
Collberg, C.S., Thomborson, C.D.: Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. In: IEEE TSE (2002)
-
(2002)
IEEE TSE
-
-
Collberg, C.S.1
Thomborson, C.D.2
-
17
-
-
84855707773
-
-
Technical Report UCB/EECS-2011-48, University of California, Berkeley, Tech. Rep.
-
Felt, A., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. Technical Report UCB/EECS-2011-48, University of California, Berkeley, Tech. Rep. (2011)
-
(2011)
Android Permissions Demystified
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
18
-
-
84863157623
-
Treemaps for space-constrained visualization of hierarchies
-
Shneiderman, B.: Treemaps for space-constrained visualization of hierarchies. In: ACM TOG (1998)
-
(1998)
ACM TOG
-
-
Shneiderman, B.1
-
19
-
-
84863157622
-
-
de-Dexer, http://dedexer.sourceforge.net
-
de-Dexer
-
-
-
20
-
-
84863174181
-
-
dex2jar, http://code.google.com/p/dex2jar/
-
Dex2jar
-
-
-
21
-
-
67650139576
-
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection
-
Chechik, M., Wirsing, M. (eds.) FASE 2009. Springer, Heidelberg
-
Nguyen, H., Nguyen, T., Pham, N., Al-Kofahi, J., Nguyen, T.: Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection. In: Chechik, M., Wirsing, M. (eds.) FASE 2009. LNCS, vol. 5503, pp. 440-455. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5503
, pp. 440-455
-
-
Nguyen, H.1
Nguyen, T.2
Pham, N.3
Al-Kofahi, J.4
Nguyen, T.5
-
23
-
-
0032201716
-
An optimal algorithm for approximate nearest neighbor search in fixed dimensions
-
Arya, S., Mount, D., Netanyahu, N., Silverman, R., Wu, A.: An optimal algorithm for approximate nearest neighbor search in fixed dimensions. JACM (1998)
-
(1998)
JACM
-
-
Arya, S.1
Mount, D.2
Netanyahu, N.3
Silverman, R.4
Wu, A.5
-
24
-
-
34548767669
-
Deckard: Scalable and accurate tree-based detection of code clones
-
IEEE Computer Society
-
Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate tree-based detection of code clones. In: ICSE. IEEE Computer Society (2007)
-
(2007)
ICSE
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
25
-
-
33645819206
-
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
-
Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. In: IEEE TSE (2006)
-
(2006)
IEEE TSE
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
26
-
-
15844362342
-
A Differencing Algorithm for Object-Oriented Programs
-
Apiwattanapong, T., Orso, A., Harrold, M.: A Differencing Algorithm for Object-Oriented Programs. In: ASE (2004)
-
(2004)
ASE
-
-
Apiwattanapong, T.1
Orso, A.2
Harrold, M.3
-
27
-
-
85018098984
-
Semantic Diff: A Tool for Summarizing the Effects of Modifications
-
Jackson, D., Ladd, D.: Semantic Diff: A Tool for Summarizing the Effects of Modifications. In: ICSM (1994)
-
(1994)
ICSM
-
-
Jackson, D.1
Ladd, D.2
-
28
-
-
84981570490
-
Identification of Program Modifications and its Applications to Software Maintenance
-
Laski, J., Szermer,W.: Identification of Program Modifications and its Applications to Software Maintenance. In: ICSM (1992)
-
(1992)
ICSM
-
-
Laski, J.1
Szermer, W.2
-
30
-
-
0033717004
-
Semantics-Preserving Procedure Extraction
-
Komondoor, R., Horwitz, S.: Semantics-Preserving Procedure Extraction. In: POPL (2000)
-
(2000)
POPL
-
-
Komondoor, R.1
Horwitz, S.2
|