共 45 条
[11]
[Anonymous], 2001, Technical Report
[12]
Reliable Third-Party Library Detection in Android and its Security Applications
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:356-367
[14]
Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets
[J].
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014),
2014,
:175-186
[15]
Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
[16]
Crussell Jonathan, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P37, DOI 10.1007/978-3-642-33167-1_3
[17]
Eichberg Michael, 2014, P 3 ACM SIGPLAN INT, P1, DOI DOI 10.1145/2614628.2614630
[18]
Glanz L., 2017, CODEMATCH ARTIFACTS
[19]
Gonzalez H., 2014, P INT C SECURITY PRI, P436
[20]
Google, 2017, ENJ