4.4 Article

Empirical study of android repackaged applications

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Software Engineering

Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark

Li Li et al.

Summary: Repackaging poses a serious threat to the Android ecosystem, with existing research facing challenges of scalability and lack of tool support. Furthermore, the slow progress and difficulty in replicating high-performance results hinder advancements in the field.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2021)

Proceedings Paper Computer Science, Software Engineering

MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies

Li Li et al.

2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE) (2018)

Article Computer Science, Theory & Methods

Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique

Yinxing Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Software Engineering

HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security

Kobra Khanmohammadi et al.

2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS) (2017)

Proceedings Paper Computer Science, Software Engineering

RepDroid: An Automated Tool for Android Application Repackaging Detection

Shengtao Yue et al.

2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC) (2017)

Article Computer Science, Theory & Methods

ICCDetector: ICC-Based Malware Detection on Android

Ke Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

AndroZoo: Collecting Millions of Android Apps for the Research Community

Kevin Allix et al.

13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016) (2016)

Proceedings Paper Computer Science, Theory & Methods

Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware

Ke Tian et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016) (2016)

Article Computer Science, Information Systems

AnDarwin: Scalable Detection of Android Application Clones Based on Semantics

Jonathan Crussell et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)

Article Computer Science, Hardware & Architecture

Detecting Android Malware Using Clone Detection

Jian Chen et al.

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2015)

Article Computer Science, Information Systems

Detect repackaged Android application based on HTTP traffic similarity

Xueping Wu et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Software Engineering

Detection of repackaged mobile applications through a collaborative approach

Alessandro Aldini et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2015)

Proceedings Paper Computer Science, Software Engineering

Detecting Clones in Android Applications through Analyzing User Interfaces

Charlie Soh et al.

2015 IEEE 23RD INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION ICPC 2015 (2015)

Proceedings Paper Computer Science, Artificial Intelligence

An Ad Hoc Mobile Cloud and Its Dynamic Loading of Modules into a Mobile Device Running Google Android

Filip Maly et al.

NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS (2015)

Proceedings Paper Computer Science, Information Systems

A Rapid and Scalable Method for Android Application Repackaging Detection

Sibei Jiao et al.

INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015 (2015)

Article Computer Science, Theory & Methods

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

William Enck et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2014)

Article Computer Science, Artificial Intelligence

DENDROID: A text mining approach to analyzing and classifying code structures in Android malware families

Guillermo Suarez-Tangil et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Software Engineering

A Large-Scale Empirical Study on Software Reuse in Mobile Apps

Israel J. Mojica et al.

IEEE SOFTWARE (2014)

Proceedings Paper Computer Science, Information Systems

MAdFraud: Investigating Ad Fraud in Android Applications

Jonathan Crussell et al.

MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (2014)

Proceedings Paper Computer Science, Software Engineering

Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets

Kai Chen et al.

36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014) (2014)

Proceedings Paper Computer Science, Information Systems

Drebin: Effective and Explainable Detection of Android Malware in Your Pocket

Daniel Arp et al.

21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)

Article Computer Science, Information Systems

Identifying android malicious repackaged applications by thread-grained system call sequences

Ying-Dar Lin et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

F2S2: Fast forensic similarity search through indexing piecewise hash signatures

Christian Winter et al.

DIGITAL INVESTIGATION (2013)