Author:
Ma Jun,Sun Qing-Wei,Xu Chang,Tao Xian-Ping
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference76 articles.
1. Zhou W, Zhou Y, Jiang X, Ning P. Detecting repackaged smartphone applications in third-party Android marketplaces. In Proc. the 2nd ACM Conference on Data and Application Security and Privacy, Feb. 2012, pp.317-326. https://doi.org/10.1145/2133601.2133640.
2. Zhou Y, Jiang X. Dissecting Android malware: Characterization and evolution. In Proc. the 2012 IEEE Symposium on Security and Privacy, May 2012, pp.95-109. https://doi.org/10.1109/SP.2012.16.
3. Tamada H, Nakamura M, Monden A, Matsumoto K. Design and evaluation of birthmarks for detecting theft of Java programs. In Proc. IASTED International Conference on Software Engineering, February 2004, pp.569-574.
4. Hanna S, Huang L, Wu E, Li S, Chen C, Song D. Juxtapp: A scalable system for detecting code reuse among android applications. In Proc. the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, July 2013, pp.62-81. https://doi.org/10.1007/978-3-642-37300-8_4.
5. Gonzalez H, Stakhanova N, Ghorbani A A. DroidKin: Lightweight detection of Android apps similarity. In Proc. the 10th International Conference on Security and Privacy in Communication Networks, Sept. 2015, pp.436-453. https://doi.org/10.1007/978-3-319-23829-6_30.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献