Author:
Rahim Khan M.A.,Jain Manoj Kumar
Reference28 articles.
1. https://arstechnica.com/information-technology/2020/03/found-malicious-google-play-apps-with-1-7-million-downloads-many-by-children/.
2. L. Luo Y. Fu D. Wu S. Zhu P. Liu. (2016, June). Repackage-proofing android apps. In2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 550-561). IEEE.
3. Luo, Lannan, et al. “Repackage-proofing android apps.”2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2016.
4. Vidas, T., Votipka, D., & Christin, N. (2011, August). All Your Droid Are Belong to Us: A Survey of Current Android Attacks. InWoot(pp. 81-90).
5. (2015). Dexextractor. [Online]. Available: https://github.com/lambdalang/DexExtractor
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey on the Role of Reverse Engineering in Security Attacks;2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE);2023-11-01
2. An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks;IEEE Access;2022