-
1
-
-
84866918123
-
Using GUI Ripping for Automated Testing of Android Applications
-
New York, NY, USA, ACM
-
Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana, Salvatore De Carmine, and Atif M. Memon. Using GUI Ripping for Automated Testing of Android Applications. In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pages 258-261, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012
, pp. 258-261
-
-
Amalfitano, D.1
Fasolino, A.R.2
Tramontana, P.3
De Carmine, S.4
Memon, A.M.5
-
2
-
-
84871278310
-
Automated Concolic Testing of Smartphone Apps
-
Saswat Anand, Mayur Naik, Hongseok Yang, and Mary Jean Harrold. Automated Concolic Testing of Smartphone Apps. In ACM International Symposium on Foundations of Software Engineering, FSE, 2012.
-
ACM International Symposium on Foundations of Software Engineering, FSE, 2012
-
-
Anand, S.1
Naik, M.2
Yang, H.3
Harrold, M.J.4
-
3
-
-
1242297829
-
Advanced Obfuscation Techniques for Java Bytecode
-
April
-
Jien-Tsai Chan and Wuu Yang. Advanced Obfuscation Techniques for Java Bytecode. J. Syst. Softw., 71(1-2):1-10, April 2004.
-
(2004)
J. Syst. Softw.
, vol.71
, Issue.1-2
, pp. 1-10
-
-
Chan, J.-T.1
Yang, W.2
-
4
-
-
8344263880
-
Dynamic Path-based Software Watermarking
-
New York, NY, USA, ACM
-
Christian Collberg, Edward Carter, Saumya Debray, Andrew Huntwork, John Kececioglu, Cullen Linn, and Michael Stepp. Dynamic Path-based Software Watermarking. In Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, PLDI '04, pages 107-118, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, PLDI '04
, pp. 107-118
-
-
Collberg, C.1
Carter, E.2
Debray, S.3
Huntwork, A.4
Kececioglu, J.5
Linn, C.6
Stepp, M.7
-
5
-
-
3042819306
-
SandMark - A Tool for Software Protection Research
-
July/Auguest
-
Christian Collberg, Ginger Myles, and Andrew Huntwork. SandMark - A Tool for Software Protection Research. IEEE Security and Privacy, Vol. 1, Num. 4, July/Auguest 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
-
-
Collberg, C.1
Myles, G.2
Huntwork, A.3
-
6
-
-
0032691819
-
Software Watermarking: Models and Dynamic Embeddings
-
New York, NY, USA, ACM
-
Christian Collberg and Clark Thomborson. Software Watermarking: Models and Dynamic Embeddings. In Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '99, pages 311-324, New York, NY, USA, 1999. ACM.
-
(1999)
Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '99
, pp. 311-324
-
-
Collberg, C.1
Thomborson, C.2
-
7
-
-
0031649930
-
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs
-
New York, NY, USA, ACM
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '98, pages 184-196, New York, NY, USA, 1998. ACM.
-
(1998)
Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '98
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
33746053187
-
Control Code Obfuscation by Abstract Interpretation
-
Washington, DC, USA, IEEE Computer Society
-
Mila Dalla Preda and Roberto Giacobazzi. Control Code Obfuscation by Abstract Interpretation. In Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, SEFM '05, pages 301-310, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, SEFM '05
, pp. 301-310
-
-
Preda, M.D.1
Giacobazzi, R.2
-
11
-
-
84877937868
-
-
FITTEST. Online; accessed at Dec 1, 2012
-
FITTEST. M[agi]C Tool: M*C Test Generation Tool. http://selab.fbk.eu/magic/. Online; accessed at Dec 1, 2012.
-
M[agi]C Tool: M*C Test Generation Tool
-
-
-
12
-
-
33845388807
-
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation
-
Ki-Joon Chae and Moti Yung, editors, Information Security Applications, Springer Berlin Heidelberg
-
Kazuhide Fukushima and Kouichi Sakurai. A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. In Ki-Joon Chae and Moti Yung, editors, Information Security Applications, volume 2908 of Lecture Notes in Computer Science, pages 303-316. Springer Berlin Heidelberg, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2908
, pp. 303-316
-
-
Fukushima, K.1
Sakurai, K.2
-
14
-
-
0029719687
-
Is It a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-directed Pointers in C
-
New York, NY, USA, ACM
-
Rakesh Ghiya and Laurie J. Hendren. Is It a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-directed Pointers in C. In Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '96, pages 1-15, New York, NY, USA, 1996. ACM.
-
(1996)
Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '96
, pp. 1-15
-
-
Ghiya, R.1
Hendren, L.J.2
-
16
-
-
84883274433
-
Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications
-
Steve Hanna, Ling Huang, Saung Li, Charles Chen, and Dawn Song. Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications. In 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA 2012, July 2012.
-
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA 2012, July 2012
-
-
Hanna, S.1
Huang, L.2
Li, S.3
Chen, C.4
Song, D.5
-
17
-
-
84878002048
-
-
Google Inc. Online; accessed at Nov 30, 2012
-
Google Inc. Android Application Licensing. http://developer.android.com/ guide/google/play/licensing/index.html. Online; accessed at Nov 30, 2012.
-
Android Application Licensing
-
-
-
18
-
-
84876097115
-
-
Google Inc. Online; accessed at Nov 30, 2012
-
Google Inc. Android Debug Bridge. http://developer.android.com/tools/ help/adb.html. Online; accessed at Nov 30, 2012.
-
Android Debug Bridge
-
-
-
19
-
-
84877952796
-
-
Google Inc. Online; accessed at Nov 30, 2012
-
Google Inc. Android Emulator. http://developer.android.com/tools/help/ emulator.html. Online; accessed at Nov 30, 2012.
-
Android Emulator
-
-
-
20
-
-
84877979519
-
-
Google Inc. Online; accessed at Nov 30, 2012
-
Google Inc. Building and Running Android App from Command Line. http://developer.android.com/tools/building/building-cmdline.html. Online; accessed at Nov 30, 2012.
-
Building and Running Android App from Command Line
-
-
-
21
-
-
84877932760
-
-
Google Inc. Online; accessed at Nov 30, 2012
-
Google Inc. Testing Fundamental | Android Developers. http://developer.android.com/tools/testing/testing-android.html . Online; accessed at Nov 30, 2012.
-
Testing Fundamental | Android Developers
-
-
-
22
-
-
84870819587
-
-
Google Inc. Online; accessed at Nov 30, 2012
-
Google Inc. UI/Application Exerciser Monkey. http://developer.android. com/tools/help/monkey.html. Online; accessed at Nov 30, 2012.
-
UI/Application Exerciser Monkey
-
-
-
23
-
-
84877972605
-
-
Online; accessed at Nov 30, 2012
-
Lookout Inc. App Genome Report: February 2011. https://www.mylookout.com/ appgenome/. Online; accessed at Nov 30, 2012.
-
App Genome Report: February 2011
-
-
-
24
-
-
84871037615
-
-
Online; accessed at Nov 30, 2012
-
Oracle Inc. Java Debug Interface. http://docs.oracle.com/javase/1.5.0/ docs/guide/jpda/jdi/. Online; accessed at Nov 30, 2012.
-
Java Debug Interface
-
-
-
26
-
-
84868344703
-
Model-Based Conformance Testing for Android
-
Goichiro Hanaoka and Toshihiro Yamauchi, editors, Advances in Information and Computer Security, Springer Berlin Heidelberg
-
Yiming Jing, Gail-Joon Ahn, and Hongxin Hu. Model-Based Conformance Testing for Android. In Goichiro Hanaoka and Toshihiro Yamauchi, editors, Advances in Information and Computer Security, volume 7631 of Lecture Notes in Computer Science, pages 1-18. Springer Berlin Heidelberg, 2012.
-
(2012)
Lecture Notes in Computer Science
, vol.7631
, pp. 1-18
-
-
Jing, Y.1
Ahn, G.-J.2
Hu, H.3
-
27
-
-
84877948522
-
Mobile Banking Vulnerability: Android Repackaging Threat
-
May
-
Seolwoo Joo and Changyeon Hwang. Mobile Banking Vulnerability: Android Repackaging Threat. Virus Bulletin, May 2012.
-
(2012)
Virus Bulletin
-
-
Joo, S.1
Hwang, C.2
-
29
-
-
84877985830
-
-
Online; accessed at Nov 30, 2012
-
Eric Lafortune. ProGuard. http://proguard.sourceforge.net/. Online; accessed at Nov 30, 2012.
-
ProGuard
-
-
Lafortune, E.1
-
31
-
-
84877985783
-
-
Lohan+. Online; accessed at Nov 30, 2012
-
Lohan+. Cracking Amazon DRM. http://androidcracking.blogspot.com/2011/04/ cracking-amazon-drm.html. Online; accessed at Nov 30, 2012.
-
Cracking Amazon DRM
-
-
-
32
-
-
84877974822
-
-
Lohan+. Online; accessed at Nov 1, 2012
-
Lohan+. Cracking Verizon's V Cast Apps DRM. http://androidcracking. blogspot.com/2011/06/cracking-verizons-v-cast-apps-drm.html. Online; accessed at Nov 1, 2012.
-
Cracking Verizon's V Cast Apps DRM
-
-
-
33
-
-
84864248639
-
A Whitebox Approach for Automated Security Testing of Android Applications on the Cloud
-
Riyadh Mahmood, Naeem Esfahani, Thabet Kacem, Nariman Mirzaei, Sam Malek, and Angelos Stavrou. A Whitebox Approach for Automated Security Testing of Android Applications on the Cloud. In Proceedings of the 7th International Workshop on Automation of Software Test, AST 2012, 2012.
-
Proceedings of the 7th International Workshop on Automation of Software Test, AST 2012, 2012
-
-
Mahmood, R.1
Esfahani, N.2
Kacem, T.3
Mirzaei, N.4
Malek, S.5
Stavrou, A.6
-
34
-
-
34548415509
-
An event-flow model of GUI-based applications for testing: Research Articles
-
September
-
Atif M. Memon. An event-flow model of GUI-based applications for testing: Research Articles. Softw. Test. Verif. Reliab., 17(3):137-157, September 2007.
-
(2007)
Softw. Test. Verif. Reliab.
, vol.17
, Issue.3
, pp. 137-157
-
-
Memon, A.M.1
-
35
-
-
0034504466
-
A Practical Method for Watermarking Java Programs
-
Washington, DC, USA, IEEE Computer Society
-
Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, and Katsuro Inoue. A Practical Method for Watermarking Java Programs. In 24th International Computer Software and Applications Conference, COMPSAC '00, pages 191-197, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
24th International Computer Software and Applications Conference, COMPSAC '00
, pp. 191-197
-
-
Monden, A.1
Iida, H.2
Ken-ichi, M.3
Torii, K.4
Inoue, K.5
-
36
-
-
35048884150
-
Threading Software Watermarks
-
Berlin, Heidelberg, Springer-Verlag
-
Jasvir Nagra and Clark Thomborson. Threading Software Watermarks. In Proceedings of the 6th International Conference on Information Hiding, IH'04, pages 208-223, Berlin, Heidelberg, 2004. Springer-Verlag.
-
(2004)
Proceedings of the 6th International Conference on Information Hiding, IH'04
, pp. 208-223
-
-
Nagra, J.1
Thomborson, C.2
-
37
-
-
24944582622
-
A Functional Taxonomy for Software Watermarking
-
ACSC '02 Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
-
Jasvir Nagra, Clark Thomborson, and Christian Collberg. A Functional Taxonomy for Software Watermarking. In Proceedings of the Twenty-fifth Australasian Conference on Computer Science - Volume 4, ACSC '02, pages 177-186, Darlinghurst, Australia, Australia, 2002. Australian Computer Society, Inc.
-
(2002)
Proceedings of the Twenty-fifth Australasian Conference on Computer Science
, vol.4
, pp. 177-186
-
-
Nagra, J.1
Thomborson, C.2
Collberg, C.3
-
38
-
-
84865294113
-
Combining Model-based and Combinatorial Testing for Effective Test Case Generation
-
New York, NY, USA, ACM
-
Cu D. Nguyen, Alessandro Marchetto, and Paolo Tonella. Combining Model-based and Combinatorial Testing for Effective Test Case Generation. In Proceedings of the 2012 International Symposium on Software Testing and Analysis, ISSTA 2012, pages 100-110, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 International Symposium on Software Testing and Analysis, ISSTA 2012
, pp. 100-110
-
-
Nguyen, C.D.1
Marchetto, A.2
Tonella, P.3
-
39
-
-
84949509764
-
Experience with Software Watermarking
-
Washington, DC, USA, IEEE Computer Society
-
Jens Palsberg, Sowmya Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, and Yi Zhang. Experience with Software Watermarking. In Proceedings of the 16th Annual Computer Security Applications Conference, ACSAC '00, pages 308-, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference, ACSAC '00
-
-
Palsberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
42
-
-
84863138661
-
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques
-
Berlin, Heidelberg, Springer-Verlag
-
Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang. Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. In Proceedings of the 4th International Conference on Engineering Secure Software and Systems, ESSoS'12, pages 106-120, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 4th International Conference on Engineering Secure Software and Systems, ESSoS'12
, pp. 106-120
-
-
Potharaju, R.1
Newell, A.2
Nita-Rotaru, C.3
Zhang, X.4
-
45
-
-
0028510908
-
The Undecidability of Aliasing
-
September
-
G. Ramalingam. The Undecidability of Aliasing. ACM Trans. Program. Lang. Syst., 16(5):1467-1471, September 1994.
-
(1994)
ACM Trans. Program. Lang. Syst.
, vol.16
, Issue.5
, pp. 1467-1471
-
-
Ramalingam, G.1
-
46
-
-
84939536815
-
-
Online; accessed at Nov 30, 2012
-
Renas Reda. Robotium. http://code.google.com/p/robotium/. Online; accessed at Nov 30, 2012.
-
Robotium
-
-
Reda, R.1
-
47
-
-
79958720486
-
Experiences of System-Level Model-Based GUI Testing of an Android Application
-
Los Alamitos, CA, USA, March IEEE Computer Society
-
Tommi Takala, Mika Katara, and Julian Harty. Experiences of System-Level Model-Based GUI Testing of an Android Application. In Proceedings of the 4th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2011), pages 377-386, Los Alamitos, CA, USA, March 2011. IEEE Computer Society.
-
(2011)
Proceedings of the 4th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2011)
, pp. 377-386
-
-
Takala, T.1
Katara, M.2
Harty, J.3
-
49
-
-
84958662213
-
Dynamic Storage Allocation: A Survey and Critical Review
-
London, UK, UK, Springer-Verlag
-
Paul R. Wilson, Mark S. Johnstone, Michael Neely, and David Boles. Dynamic Storage Allocation: A Survey and Critical Review. In Proceedings of the International Workshop on Memory Management, IWMM '95, pages 1-116, London, UK, UK, 1995. Springer-Verlag.
-
(1995)
Proceedings of the International Workshop on Memory Management, IWMM '95
, pp. 1-116
-
-
Wilson, P.R.1
Johnstone, M.S.2
Neely, M.3
Boles, D.4
-
50
-
-
85047887956
-
Aurasium: Practical Policy Enforcement for Android Applications
-
Berkeley, CA, USA, USENIX Association
-
Rubin Xu, Hassen Saïdi, and Ross Anderson. Aurasium: Practical Policy Enforcement for Android Applications. In Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, pages 27-27, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
, pp. 27-27
-
-
Xu, R.1
Saïdi, H.2
Anderson, R.3
-
52
-
-
84874828789
-
Fast, Scalable Detection of Piggybacked Mobile Applications
-
Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, and Shihong Zou. Fast, Scalable Detection of Piggybacked Mobile Applications. In Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY '13, February 2013.
-
Proceedings of the 3nd ACM Conference on Data and Application Security and Privacy, CODASPY '13, February 2013
-
-
Zhou, W.1
Zhou, Y.2
Grace, M.3
Jiang, X.4
Zou, S.5
-
53
-
-
85137132511
-
DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces
-
Wu Zhou, Yajin Zhou, Xuxian Jiang, and Peng Ning. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY '12, February 2012.
-
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY '12, February 2012
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|