共 22 条
[1]
[Anonymous], 2014, WISEC
[2]
Apvrille A., 2014, VIRUS B, P1
[4]
Statistical Deobfuscation of Android Applications
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:343-355
[5]
Calvet J., 2012, P 2012 ACM C COMP CO, P169, DOI [10.1145/2382196.2382217, DOI 10.1145/2382196.2382217]
[6]
Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets
[J].
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014),
2014,
:175-186
[8]
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation
[J].
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018),
2018,
[9]
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs
[J].
INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II,
2015, 153
:315-328
[10]
Gröbert F, 2011, LECT NOTES COMPUT SC, V6961, P41, DOI 10.1007/978-3-642-23644-0_3