Author:
Liu Xinyu,Zhao Wu,Chen Langping,Liu Qixu
Publisher
Springer International Publishing
Reference9 articles.
1. Sung, K., Huang, J., Corner, M.D., Levine, B.N.: Re-identification of mobile devices using real-time bidding advertising networks. In: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, pp. 1–13 (2020)
2. Anti-emulator. https://github.com/strazzere/anti-emulator
3. Thanasis, P., Giannis, V., Elias, A., Michalis, P., Sotiris, I.: Rage against the virtual machine: hindering dynamic analysis of Android malware. In: Proceedings of the 7th EUROSEC, Amsterdam, pp.5:1–5:6 (2014)
4. EasyProtector. https://github.com/lamster2018/EasyProtector
5. Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: AccelPrint: imperfections of accelerometers make smartphones trackable. In: NDSS. Citeseer (2014)