共 192 条
[41]
Bulazel A., 2017, P 1 REVERSING OFFENS, P2
[42]
Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:172-182
[43]
Cappaert J, 2008, LECT NOTES COMPUT SC, V4991, P86
[44]
Cecilia, 2015, 80 CHIN MOB US ROOT
[45]
Cesare S., 1999, SECURITY FOCUS
[46]
Chang H., 2001, ACM CCS 8 WORKSH SEC, P160
[47]
Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets
[J].
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014),
2014,
:175-186
[48]
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:357-376
[49]
Chen KevinZhijie., 2013, NDSS
[50]
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications
[J].
IEEE ACCESS,
2018, 6
:71229-71240