Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
IoT devices have brought invaluable convenience to our daily life. However, their
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …
Evaluation methodologies in software protection research
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …
software runs, and try to break the confidentiality or integrity of assets embedded in the …
Use of cryptography in malware obfuscation
Malware authors often use cryptographic tools such as XOR encryption and block ciphers
like AES to obfuscate part of the malware to evade detection. Use of cryptography may give …
like AES to obfuscate part of the malware to evade detection. Use of cryptography may give …
Precisely Extracting Complex Variable Values from Android Apps
M Miltenberger, S Arzt - ACM Transactions on Software Engineering and …, 2024 - dl.acm.org
Millions of users nowadays rely on their smartphones to process sensitive data through apps
from various vendors and sources. Therefore, it is vital to assess these apps for security …
from various vendors and sources. Therefore, it is vital to assess these apps for security …
Demystifying hidden sensitive operations in android apps
Security of Android devices is now paramount, given their wide adoption among consumers.
As researchers develop tools for statically or dynamically detecting suspicious apps …
As researchers develop tools for statically or dynamically detecting suspicious apps …
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation
M Knöchel, S Karius - Proceedings of the 2024 ACM Workshop on …, 2024 - dl.acm.org
Steganography describes techniques and algorithms for hiding secret information in a cover
medium such as images, audio or text files. Malware that makes use of steganographic …
medium such as images, audio or text files. Malware that makes use of steganographic …
Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification
FH da Costa, I Medeiros, T Menezes, JV da Silva… - Journal of Systems and …, 2022 - Elsevier
The popularization of the Android platform and the growing number of Android applications
(apps) that manage sensitive data turned the Android ecosystem into an attractive target for …
(apps) that manage sensitive data turned the Android ecosystem into an attractive target for …
Collect responsibly but deliver arbitrarily? a study on cross-user privacy leakage in mobile apps
Recent years have witnessed the interesting trend that modern mobile apps perform more
and more likely as user-to-user platforms, where app users can be freely and conveniently …
and more likely as user-to-user platforms, where app users can be freely and conveniently …
A Modular Soundness Theory for the Blackboard Analysis Architecture
Sound static analyses are an important ingredient for compiler optimizations and program
verification tools. However, mathematically proving that a static analysis is sound is a difficult …
verification tools. However, mathematically proving that a static analysis is sound is a difficult …