Publisher
Springer Nature Switzerland
Reference31 articles.
1. Android Developers: UI/Application Exerciser Monkey. https://developer.android.com/studio/test/other-testing-tools/monkey
2. Averin, A., Zyulyarkina, N.: Malicious QR-Code threats and vulnerability of blockchain. In: 2020 Global Smart Industry Conference (GloSIC), pp. 82–86 (2020). https://doi.org/10.1109/GloSIC50886.2020.9267840
3. Cao, C., Gao, N., Liu, P., Xiang, J.: Towards analyzing the input validation vulnerabilities associated with android system services. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 361–370 (2015)
4. DroidPilot Team: DroidPilot. https://droidpilot.wordpress.com/
5. Fioraldi, A., Maier, D., Eißfeldt, H., Heuse, M.: AFL++: combining incremental steps of fuzzing research. In: 14th USENIX Workshop on Offensive Technologies (WOOT 20) (2020)