-
1
-
-
34948902663
-
Obfuscating java: The most pain for the least gain
-
Berlin, Heidelberg, Springer-Verlag
-
M. Batchelder and L. Hendren. Obfuscating Java: the most pain for the least gain. In Proceedings of the 16th international conference on Compiler construction, CC'07, pages 96-110, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 16th International Conference on Compiler Construction, CC'07
, pp. 96-110
-
-
Batchelder, M.1
Hendren, L.2
-
4
-
-
84871635561
-
Android application's copyright protection technology based on forensic mark
-
New York, NY, USA, ACM
-
S. Choi, J. Jang, and E. Jae. Android application's copyright protection technology based on forensic mark. In Proceedings of the 2012 ACM Research in Applied Computation Symposium, RACS '12, pages 338-339, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Research in Applied Computation Symposium, RACS '12
, pp. 338-339
-
-
Choi, S.1
Jang, J.2
Jae, E.3
-
5
-
-
0027684663
-
Operating system protection through program evolution
-
Oct.
-
F. B. Cohen. Operating system protection through program evolution. Comput. Secur., 12(6):565-584, Oct. 1993.
-
(1993)
Comput. Secur.
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.B.1
-
7
-
-
0004046658
-
-
Technical Report 148, Department of Computer Science, University of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
84872224783
-
Madam: A multi-level anomaly detector for android malware
-
Berlin, Heidelberg, Springer-Verlag
-
G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra. Madam: a multi-level anomaly detector for android malware. In Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security, MMM-ACNS'12, pages 240-253, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security, MMM-ACNS'12
, pp. 240-253
-
-
Dini, G.1
Martinelli, F.2
Saracino, A.3
Sgandurra, D.4
-
11
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA, USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
12
-
-
0004061016
-
-
Addison-Wesley Professional, 1 edition, July
-
M. Fowler, K. Beck, J. Brant, W. Opdyke, and D. Roberts. Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, 1 edition, July 1999.
-
(1999)
Refactoring: Improving the Design of Existing Code
-
-
Fowler, M.1
Beck, K.2
Brant, J.3
Opdyke, W.4
Roberts, D.5
-
13
-
-
84893817812
-
-
Accessed: 01.02.2013
-
Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011; Smartphone Sales Increased 42 Percent. http://www.gartner.com/ newsroom/id/1848514. Accessed: 01.02.2013.
-
Smartphone Sales Increased 42 Percent
-
-
-
14
-
-
84893749485
-
-
Accessed: 01.02.2013
-
Gartner Says Worldwide Sales of Mobile Phones Declined 3 Percent in Third Quarter of 2012; Smartphone Sales Increased 47 Percent. http://www. gartner.com/newsroom/id/2237315. Accessed: 01.02.2013.
-
Smartphone Sales Increased 47 Percent
-
-
-
15
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
Jan.
-
S. Horwitz, T. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. ACM Trans. Program. Lang. Syst., 12(1):26-60, Jan. 1990.
-
(1990)
ACM Trans. Program. Lang. Syst.
, vol.12
, Issue.1
, pp. 26-60
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
17
-
-
84871624367
-
An anti-piracy mechanism based on class separation and dynamic loading for android applications
-
New York, NY, USA, ACM
-
Y.-S. Jeong, Y.-U. Park, J.-C. Moon, S.-J. Cho, D. Kim, and M. Park. An anti-piracy mechanism based on class separation and dynamic loading for android applications. In Proceedings of the 2012 ACM Research in Applied Computation Symposium, RACS '12, pages 328-332, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Research in Applied Computation Symposium, RACS '12
, pp. 328-332
-
-
Jeong, Y.-S.1
Park, Y.-U.2
Moon, J.-C.3
Cho, S.-J.4
Kim, D.5
Park, M.6
-
18
-
-
84871637060
-
A method for detecting illegally copied apk files on the network
-
New York, NY, USA, ACM
-
S. Kim, E. Kim, and J. Choi. A method for detecting illegally copied apk files on the network. In Proceedings of the 2012 ACM Research in Applied Computation Symposium, RACS '12, pages 253-256, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Research in Applied Computation Symposium, RACS '12
, pp. 253-256
-
-
Kim, S.1
Kim, E.2
Choi, J.3
-
20
-
-
33749559863
-
Detection of software plagiarism by program dependence graph analysis
-
New York, NY, USA, ACM
-
C. Liu, C. Chen, J. Han, and P. S. Yu. Gplag: detection of software plagiarism by program dependence graph analysis. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '06, pages 872-881, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '06
, pp. 872-881
-
-
Liu, C.1
Chen, C.2
Han, J.3
Yu. Gplag, P.S.4
-
21
-
-
46749148846
-
Metricsbased evaluation of slicing obfuscations
-
Washington, DC, USA, IEEE Computer Society
-
A. Majumdar, S. Drape, and C. Thomborson. Metricsbased evaluation of slicing obfuscations. In Proceedings of the Third International Symposium on Information Assurance and Security, IAS '07, pages 472-477, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the Third International Symposium on Information Assurance and Security, IAS '07
, pp. 472-477
-
-
Majumdar, A.1
Drape, S.2
Thomborson, C.3
-
22
-
-
58049162000
-
Slicing obfuscations: Design, correctness, and evaluation
-
New York, NY, USA, ACM
-
A. Majumdar, S. J. Drape, and C. D. Thomborson. Slicing obfuscations: design, correctness, and evaluation. In Proceedings of the 2007 ACM workshop on Digital Rights Management, DRM '07, pages 70-81, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 ACM Workshop on Digital Rights Management, DRM '07
, pp. 70-81
-
-
Majumdar, A.1
Drape, S.J.2
Thomborson, C.D.3
-
23
-
-
84863138661
-
Plagiarizing smartphone applications: Attack strategies and defense techniques
-
Berlin, Heidelberg, Springer-Verlag
-
R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang. Plagiarizing smartphone applications: attack strategies and defense techniques. In Proceedings of the 4th international conference on Engineering Secure Software and Systems, ESSoS'12, pages 106-120, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 4th International Conference on Engineering Secure Software and Systems, ESSoS'12
, pp. 106-120
-
-
Potharaju, R.1
Newell, A.2
Nita-Rotaru, C.3
Zhang, X.4
-
24
-
-
84893763843
-
-
T. A. O. S. Project. Accessed: 18.01.2013
-
T. A. O. S. Project. Google play distribution. http://developer.android. com/ google/play/dist.html, 2012. Accessed: 18.01.2013.
-
(2012)
Google Play Distribution
-
-
-
25
-
-
84878002579
-
Droidchameleon: Evaluating android anti-malware against transformation attacks
-
New York, NY, USA, ACM
-
V. Rastogi, Y. Chen, and X. Jiang. Droidchameleon: evaluating android anti-malware against transformation attacks. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pages 329-334, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS '13
, pp. 329-334
-
-
Rastogi, V.1
Chen, Y.2
Jiang, X.3
-
28
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
Feb
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y.Weiss. "andromaly": a behavioral malware detection framework for android devices. J. Intell. Inf. Syst., 38(1):161-190, Feb. 2012.
-
(2012)
J. Intell. Inf. Syst.
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
29
-
-
84878001173
-
Mobile-sandbox: Having a deeper look into android applications
-
New York, NY, USA, ACM
-
M. Spreitzenbarth, F. Freiling, F. Echtler, T. Schreck, and J. Hoffmann. Mobile-sandbox: having a deeper look into android applications. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, pages 1808-1815, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13
, pp. 1808-1815
-
-
Spreitzenbarth, M.1
Freiling, F.2
Echtler, F.3
Schreck, T.4
Hoffmann, J.5
-
30
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of java programs
-
H. Tamada, M. Nakamura, A. Monden, and K. ichi Matsumoto. Design and evaluation of birthmarks for detecting theft of Java programs. In IN PROC. OF THE IASTED INT. CONF. ON SOFTWARE ENGINEERING, pages 569-575, 2004.
-
(2004)
Proc. of the Iasted Int. Conf. on Software Engineering
, pp. 569-575
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Ichi Matsumoto, K.4
-
31
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of windows applications
-
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and Matsumoto. K.: Dynamic software birthmarks to detect the theft of windows applications. In In: International Symposium on Future Software Technology, 2004.
-
(2004)
International Symposium on Future Software Technology
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.5
-
33
-
-
33646843643
-
Soot-a java bytecode optimization framework
-
IBM Press
-
R. Vallée-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot-a Java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON '99, pages 13-. IBM Press, 1999.
-
(1999)
Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCon '99
, pp. 13
-
-
Vallée-Rai, R.1
Co, P.2
Gagnon, E.3
Hendren, L.4
Lam, P.5
Sundaresan, V.6
-
34
-
-
84893730846
-
-
Accessed: 24.01.2013
-
VirusTotal Malware Detection. https://www. virustotal.com/. Accessed: 24.01.2013.
-
-
-
-
35
-
-
77950834638
-
Detecting software theft via system call based birthmarks
-
dec
-
X. Wang, Y.-C. Jhi, S. Zhu, and P. Liu. Detecting software theft via system call based birthmarks. In Computer Security Applications Conference, 2009. ACSAC '09. Annual, pages 149-158, dec. 2009.
-
(2009)
Computer Security Applications Conference, 2009. ACSAC '09. Annual
, pp. 149-158
-
-
Wang, X.1
Jhi, Y.-C.2
Zhu, S.3
Liu, P.4
-
36
-
-
85050273691
-
Program slicing
-
Piscataway, NJ, USA, IEEE Press
-
M. Weiser. Program slicing. In Proceedings of the 5th international conference on Software engineering, ICSE '81, pages 439-449, Piscataway, NJ, USA, 1981. IEEE Press.
-
(1981)
Proceedings of the 5th International Conference on Software Engineering, ICSE '81
, pp. 439-449
-
-
Weiser, M.1
-
37
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
Berkeley, CA, USA, USENIX Association
-
L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 29-29, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
, pp. 29-29
-
-
Yan, L.K.1
Yin, H.2
-
39
-
-
85137132511
-
Detecting repackaged smartphone applications in third-party android marketplaces
-
New York, NY, USA, ACM
-
W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASPY '12, pages 317-326, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY '12
, pp. 317-326
-
-
Zhou, W.1
Zhou, Y.2
Jiang, X.3
Ning, P.4
-
41
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Feb
-
Y. Zhou, Z.Wang,W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, Feb. 2012.
-
(2012)
Proceedings of the 19th Annual Network & Distributed System Security Symposium
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|