On locating malicious code in piggybacked Android apps
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app co...
Saved in:
Main Authors: | LI, Li, LI, Daoyuan, BISSYANDE, Tegawende F., KLEIN, Jacques, CAI, Haipeng, LO, David, LE TRAON, Yves |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3914 https://ink.library.smu.edu.sg/context/sis_research/article/4916/viewcontent/101007_2Fs11390_017_1786_z.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Understanding Android app piggybacking: A systematic study of malicious code grafting
by: LI, Li, et al.
Published: (2017) -
Automatically locating malicious packages in piggybacked Android apps
by: LI, Li, et al.
Published: (2017) -
Measuring the declared SDK versions and their consistency with API calls in android apps
by: WU, Daoyuan, et al.
Published: (2017) -
Android app in conjunction with BLE beacon
by: Goh, Jun Yang
Published: (2024) -
Automatically distilling storyboard with rich features for Android apps
by: Chen, Sen, et al.
Published: (2022)