-
4
-
-
84885372252
-
-
Dex2jar, http://code.google.com/p/dex2jar/
-
Dex2jar
-
-
-
5
-
-
84885379378
-
-
Dexguard, http://www.saikoa.com/dexguard
-
Dexguard
-
-
-
6
-
-
84885386051
-
-
Dexobf, http://dexlabs.org/blog/bytecode-obfuscation
-
Dexobf
-
-
-
7
-
-
84885378628
-
-
Dx tool source code, http://grepcode.com/file/repository.grepcode.com/ java/ext/com.google.android/android/4.1.2 r1/com/android/dx/ssa/
-
Dx Tool Source Code
-
-
-
8
-
-
84884645850
-
-
Gartner says android to command nearly half of worldwide smartphone operating system market by year-end 2012
-
Gartner says android to command nearly half of worldwide smartphone operating system market by year-end 2012, http://www.gartner.com/it/page.jsp?id= 1622614
-
-
-
-
9
-
-
84885371678
-
-
Klassmaster, http://www.zelix.com/klassmaster/docs/index.html
-
Klassmaster
-
-
-
11
-
-
84885382100
-
-
ProGuard, http://proguard.sourceforge.net/
-
-
-
-
12
-
-
84874856400
-
-
Smali/Baksmali, http://code.google.com/p/smali/
-
Smali/Baksmali
-
-
-
14
-
-
84885378544
-
-
Wala, http://wala.sourceforge.net/wiki/index.php/
-
-
-
-
16
-
-
70349263325
-
Towards experimental evaluation of code obfuscation techniques
-
ACM, New York
-
Ceccato, M., Di Penta, M., Nagra, J., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: Towards experimental evaluation of code obfuscation techniques. In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, pp. 39-46. ACM, New York (2008), http://doi.acm.org/10.1145/1456362. 1456371
-
(2008)
Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008
, pp. 39-46
-
-
Ceccato, M.1
Di Penta, M.2
Nagra, J.3
Falcarin, P.4
Ricca, F.5
Torchiano, M.6
Tonella, P.7
-
17
-
-
3042819306
-
Sandmarks a tool for software protection research
-
Collberg, C., Myles, G., Huntwork, A.: Sandmarks a tool for software protection research. IEEE Security and Privacy 1(4), 40-49 (2003)
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 40-49
-
-
Collberg, C.1
Myles, G.2
Huntwork, A.3
-
19
-
-
84865590234
-
Attack of the clones: Detecting cloned applications on android markets
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
-
Crussell, J., Gibler, C., Chen, H.: Attack of the clones: Detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37-54. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7459
, pp. 37-54
-
-
Crussell, J.1
Gibler, C.2
Chen, H.3
-
21
-
-
79959902968
-
Value-based program characterization and its application to software plagiarism detection
-
ACM
-
Jhi, Y.-C., Wang, X., Jia, X., Zhu, S., Liu, P., Wu, D.: Value-based program characterization and its application to software plagiarism detection. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 756-765. ACM (2011)
-
(2011)
Proceedings of the 33rd International Conference on Software Engineering
, pp. 756-765
-
-
Jhi, Y.-C.1
Wang, X.2
Jia, X.3
Zhu, S.4
Liu, P.5
Wu, D.6
-
22
-
-
84885379914
-
-
Karnick, M., Macbride, J.,Mcginnis, S., Tang, Y., Ramach, R.: A qualitative analysis of Java obfuscation
-
A Qualitative Analysis of Java Obfuscation
-
-
Karnick, M.1
Macbride, J.2
Mcginnis, S.3
Tang, Y.4
Ramach, R.5
-
24
-
-
84857945430
-
-
Technical Report NAS-TR-0140-2010, Network and Security Research Center, Department of Computer Science and Engineering, University Park, PA, USA September
-
Octeau, D., Enck, W., McDaniel, P.: The ded Decompiler. Technical Report NAS-TR-0140-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (September 2010), http://siis.cse.psu.edu/ded/papers/NAS-TR-0140-2010.pdf
-
(2010)
The Ded Decompiler
-
-
Octeau, D.1
Enck, W.2
McDaniel, P.3
-
26
-
-
77950834638
-
Detecting software theft via system call based birthmarks
-
IEEE
-
Wang, X., Jhi, Y.-C., Zhu, S., Liu, P.: Detecting software theft via system call based birthmarks. In: Annual Computer Security Applications Conference, ACSAC 2009, pp. 149-158. IEEE (2009)
-
(2009)
Annual Computer Security Applications Conference, ACSAC 2009
, pp. 149-158
-
-
Wang, X.1
Jhi, Y.-C.2
Zhu, S.3
Liu, P.4
-
29
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
ACM, New York
-
Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, pp. 317-326. ACM, New York (2012)
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
|