1. Mohd Shahdi Ahmad , Nur Emyra Musa , Rathidevi Nadarajah , Rosilah Hassan , and Nor Effendy Othman . 2013 . Comparison between android and iOS Operating System in terms of security . In CITA 2013: 8th International Conference on Information Technology in Asia. 1–4. Mohd Shahdi Ahmad, Nur Emyra Musa, Rathidevi Nadarajah, Rosilah Hassan, and Nor Effendy Othman. 2013. Comparison between android and iOS Operating System in terms of security. In CITA 2013: 8th International Conference on Information Technology in Asia. 1–4.
2. Fattoh Al-Qershi , Muhammad Al-Qurishi , Sk Md Mizanur Rahman , and Atif Al-Amri . 2014 . Android vs. iOS: The security battle . In WCCAIS 2014: World Congress on Computer Applications and Information Systems. 1–8. Fattoh Al-Qershi, Muhammad Al-Qurishi, Sk Md Mizanur Rahman, and Atif Al-Amri. 2014. Android vs. iOS: The security battle. In WCCAIS 2014: World Congress on Computer Applications and Information Systems. 1–8.
3. 2022. angr. https://github.com/angr/angr. 2022. angr. https://github.com/angr/angr.
4. Reliable Third-Party Library Detection in Android and its Security Applications
5. Salman A Baset , Shih-Wei Li , Philippe Suter , and Omer Tripp . 2017 . Identifying Android library dependencies in the presence of code obfuscation and minimization . In ICSE 2017: Proceedings of the 39th International Conference on Software Engineering. 250–252 . Salman A Baset, Shih-Wei Li, Philippe Suter, and Omer Tripp. 2017. Identifying Android library dependencies in the presence of code obfuscation and minimization. In ICSE 2017: Proceedings of the 39th International Conference on Software Engineering. 250–252.