Looking back! Using early versions of Android apps as attack vectors
Android platform is gaining explosive popularity. This leads developers to invest resources to maintain the upward trajectory of the demand. Unfortunately, as the profit potential grows higher, the chances of these Apps getting attacked also get higher. Therefore, developers improved the security of...
Saved in:
Main Authors: | ZHANG, Yue, WENG, Jian, WNEG, Jia-Si, HOU, Lin, YANG, Anjia, LI, Ming, XIANG, Yang, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6586 https://ink.library.smu.edu.sg/context/sis_research/article/7589/viewcontent/08703119.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Understanding Android app piggybacking: A systematic study of malicious code grafting
by: LI, Li, et al.
Published: (2017) -
Active warden attack: On the (in)effectiveness of Android app repackage-proofing
by: MA, Haoyu, et al.
Published: (2022) -
Measuring the declared SDK versions and their consistency with API calls in android apps
by: WU, Daoyuan, et al.
Published: (2017) -
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls
by: WU, Daoyuan, et al.
Published: (2021) -
SeqAdver: Automatic payload construction and injection in sequence-based Android adversarial attack
by: ZHANG, Fei, et al.
Published: (2023)