相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark
Li Li et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2021)
MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies
Li Li et al.
2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE) (2018)
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique
Yinxing Xue et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Kobra Khanmohammadi et al.
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS) (2017)
RepDroid: An Automated Tool for Android Application Repackaging Detection
Shengtao Yue et al.
2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC) (2017)
ICCDetector: ICC-Based Malware Detection on Android
Ke Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
AndroZoo: Collecting Millions of Android Apps for the Research Community
Kevin Allix et al.
13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016) (2016)
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware
Ke Tian et al.
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016) (2016)
AnDarwin: Scalable Detection of Android Application Clones Based on Semantics
Jonathan Crussell et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)
Detecting Android Malware Using Clone Detection
Jian Chen et al.
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2015)
Detect repackaged Android application based on HTTP traffic similarity
Xueping Wu et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
Detection of repackaged mobile applications through a collaborative approach
Alessandro Aldini et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2015)
Detecting Clones in Android Applications through Analyzing User Interfaces
Charlie Soh et al.
2015 IEEE 23RD INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION ICPC 2015 (2015)
An Ad Hoc Mobile Cloud and Its Dynamic Loading of Modules into a Mobile Device Running Google Android
Filip Maly et al.
NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS (2015)
A Rapid and Scalable Method for Android Application Repackaging Detection
Sibei Jiao et al.
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015 (2015)
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
William Enck et al.
ACM TRANSACTIONS ON COMPUTER SYSTEMS (2014)
DENDROID: A text mining approach to analyzing and classifying code structures in Android malware families
Guillermo Suarez-Tangil et al.
EXPERT SYSTEMS WITH APPLICATIONS (2014)
A Large-Scale Empirical Study on Software Reuse in Mobile Apps
Israel J. Mojica et al.
IEEE SOFTWARE (2014)
MAdFraud: Investigating Ad Fraud in Android Applications
Jonathan Crussell et al.
MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (2014)
Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets
Kai Chen et al.
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014) (2014)
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
Daniel Arp et al.
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)
Identifying android malicious repackaged applications by thread-grained system call sequences
Ying-Dar Lin et al.
COMPUTERS & SECURITY (2013)
F2S2: Fast forensic similarity search through indexing piecewise hash signatures
Christian Winter et al.
DIGITAL INVESTIGATION (2013)