-
1
-
-
84875641193
-
-
Anzhi android market, http://www.anzhi.com/
-
-
-
-
2
-
-
84875684539
-
-
Contagio malware dump, http://contagiodump.blogspot.com/
-
-
-
-
3
-
-
84875643119
-
-
Dalvik virtual machine, http://www.dalvikvm.com/
-
-
-
-
6
-
-
84875647990
-
-
Google in-app billing, http://developer.android.com/guide/market/billing/ index.html
-
Google In-app Billing
-
-
-
8
-
-
84875670246
-
-
Hadoop, http://hadoop.apache.org/
-
-
-
-
9
-
-
84875667386
-
-
Hash functions, http://www.cse.yorku.ca/~oz/hash.html
-
-
-
-
10
-
-
84875659275
-
-
In-app billing, http://developer.android.com/guide/market/billing/index. html
-
In-app Billing
-
-
-
11
-
-
84875654471
-
-
Mobile threat report, https://www.mylookout.com/mobile-threat-report/
-
Mobile Threat Report
-
-
-
13
-
-
84875668231
-
-
Proguard, http://developer.android.com/guide/developing/tools/proguard. html
-
Proguard
-
-
-
16
-
-
85058873694
-
Freemarket: Shopping for free in android applications
-
Extended Abstract, to appear
-
Freemarket: Shopping for free in android applications. Extended Abstract, to appear NDSS (2012)
-
(2012)
NDSS
-
-
-
18
-
-
79961035117
-
Analyzing inter-application communication in android
-
Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of MobiSys (2011)
-
(2011)
Proceedings of MobiSys
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
20
-
-
80755187788
-
Android permissions demystified
-
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of ACM CCS (2011)
-
(2011)
Proceedings of ACM CCS
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
21
-
-
57349194546
-
Scalable detection of semantic clones
-
ACM, New York
-
Gabel, M., Jiang, L., Su, Z.: Scalable detection of semantic clones. In: Proceedings of the 30th International Conference on Software Engineering, ICSE 2008, pp. 321-330. ACM, New York (2008)
-
(2008)
Proceedings of the 30th International Conference on Software Engineering, ICSE 2008
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
Su, Z.3
-
22
-
-
57049171932
-
BinHunt: Automatically finding semantic differences in binary programs
-
Chen, L., Ryan, M.D., Wang, G. (eds.) LNCS Springer, Heidelberg
-
Gao, D., Reiter, M.K., Song, D.: BinHunt: Automatically Finding Semantic Differences in Binary Programs. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 238-255. Springer, Heidelberg (2008)
-
(2008)
ICICS 2008
, vol.5308
, pp. 238-255
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
24
-
-
80755168347
-
Bitshred: Feature hashing malware for scalable triage and semantic analysis
-
Jang, J., Brumley, D., Venkataraman, S.: Bitshred: Feature hashing malware for scalable triage and semantic analysis. In: Proceedings of ACM CCS (2011)
-
(2011)
Proceedings of ACM CCS
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
25
-
-
34548767669
-
Deckard: Scalable and accurate tree-based detection of code clones
-
Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate tree-based detection of code clones. In: Proceedings of ICSE (2007)
-
(2007)
Proceedings of ICSE
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
26
-
-
71149087699
-
Feature hashing for large scale multitask learning
-
June
-
Weinberger, K., Dasgupta, A., Langford, J., Smola, A., Attenberg, J.: Feature hashing for large scale multitask learning. In: Proceedings of ICML (June 2009)
-
(2009)
Proceedings of ICML
-
-
Weinberger, K.1
Dasgupta, A.2
Langford, J.3
Smola, A.4
Attenberg, J.5
-
27
-
-
79959862704
-
Mecc: Memory comparison-based clone detector
-
ACM, New York
-
Kim, H., Jung, Y., Kim, S., Yi, K.: Mecc: memory comparison-based clone detector. In: Proceeding of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 301-310. ACM, New York (2011)
-
(2011)
Proceeding of the 33rd International Conference on Software Engineering, ICSE 2011
, pp. 301-310
-
-
Kim, H.1
Jung, Y.2
Kim, S.3
Yi, K.4
-
28
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
December
-
Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7 (December 2006)
-
(2006)
Journal of Machine Learning Research
, vol.7
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
29
-
-
33645819206
-
Cp-miner: Finding copy-paste and related bugs in large-scale software code
-
Li, Z., Lu, S., Myagmar, S., Zhou, Y.: Cp-miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering 32(3) (2006)
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.3
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
31
-
-
70049114013
-
Hash kernels
-
Shi, Q., Petterson, J., Dror, G., Langford, J., Smola, A., Strehl, A., Vishwanathan, V.: Hash kernels. In: Proceedings of AISTATS 2009 (2009)
-
(2009)
Proceedings of AISTATS 2009
-
-
Shi, Q.1
Petterson, J.2
Dror, G.3
Langford, J.4
Smola, A.5
Strehl, A.6
Vishwanathan, V.7
-
34
-
-
85137132511
-
Droidmoss: Detecting repackaged smartphone applications in third-party android marketplaces
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Droidmoss: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (2012)
-
(2012)
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|