Understanding Android app piggybacking: A systematic study of malicious code grafting
The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a large user base. Although recent research has produced approaches and tools to identify piggybacked apps, the literature lacks a comprehensive...
Saved in:
Main Authors: | LI, Li, LI, Daoyuan, BISSYANDE, Tegawende F., KLEIN, Jacques, TRAON, Yves Le, LO, David, CAVALLARO, Lorenzo |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3694 https://ink.library.smu.edu.sg/context/sis_research/article/4696/viewcontent/UnderstandingAndroidApp_2017.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
On locating malicious code in piggybacked Android apps
by: LI, Li, et al.
Published: (2017) -
A software environment for confining malicious android applications via resource virtualization
by: Li, X., et al.
Published: (2014) -
Automatically locating malicious packages in piggybacked Android apps
by: LI, Li, et al.
Published: (2017) -
SeqAdver: Automatic payload construction and injection in sequence-based Android adversarial attack
by: ZHANG, Fei, et al.
Published: (2023) -
SDAC: A slow-aging solution for Android malware detection using semantic distance based API clustering
by: XU, Jiayun, et al.
Published: (2022)