Automatically locating malicious packages in piggybacked Android apps
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app co...
Saved in:
Main Authors: | LI, Li, LI, Daoyuan, BISSYANDE, Tegawende, KLEIN, Jacques, CAI, Haipeng, LO, David, LE TRAON, Yves |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3697 https://ink.library.smu.edu.sg/context/sis_research/article/4699/viewcontent/p170_li__1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
On locating malicious code in piggybacked Android apps
by: LI, Li, et al.
Published: (2017) -
Understanding Android app piggybacking: A systematic study of malicious code grafting
by: LI, Li, et al.
Published: (2017) -
Characterizing malicious Android apps by mining topic-specific data flow signatures
by: YANG, Xinli, et al.
Published: (2017) -
Android malware detection based on novel representations of apps
by: SUN, Tiezhu, et al.
Published: (2025) -
Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub
by: BISSYANDE, Tegawende F., et al.
Published: (2013)