Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Understanding the evolution of android app vulnerabilities
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …
millions of users and millions of applications targeting a wide range of activities where …
An empirical study on android-related vulnerabilities
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and
keys. Basically, they embed most of our private information in our pocket. For this and other …
keys. Basically, they embed most of our private information in our pocket. For this and other …
[HTML][HTML] Taxonomy of security weaknesses in Java and Kotlin Android apps
Android is nowadays the most popular operating system in the world, not only in the realm of
mobile devices, but also when considering desktop and laptop computers. Such a popularity …
mobile devices, but also when considering desktop and laptop computers. Such a popularity …
Artist: The android runtime instrumentation and security toolkit
With the introduction of Android 5 Lollipop, the Android Runtime (ART) superseded the
Dalvik Virtual Machine (DVM) by introducing ahead-of-time compilation and native …
Dalvik Virtual Machine (DVM) by introducing ahead-of-time compilation and native …
Analyses for specific defects in android applications: a survey
T Wu, X Deng, J Yan, J Zhang - Frontiers of Computer Science, 2019 - Springer
Android applications (APPS) are in widespread use and have enriched our life. To ensure
the quality and security of the apps, many approaches have been proposed in recent years …
the quality and security of the apps, many approaches have been proposed in recent years …
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices
Dynamic taint analysis (DTA), as a mainstream information flow tracking technique, has
been widely used in mobile security. On the Android platform, the existing DTA approaches …
been widely used in mobile security. On the Android platform, the existing DTA approaches …
Up-to-crash: Evaluating third-party library updatability on android
Buggy and flawed third-party libraries increase their host app's attack surface and put the
users' privacy at risk. To avert this risk, libraries have to be kept updated to their newest …
users' privacy at risk. To avert this risk, libraries have to be kept updated to their newest …
The Android OS stack and its vulnerabilities: an empirical study
A Mazuera-Rozo, J Bautista-Mora… - Empirical Software …, 2019 - Springer
The wide and rapid adoption of Android-based devices in the last years has motivated the
usage of Android apps to support a broad range of daily activities. In that sense, being the …
usage of Android apps to support a broad range of daily activities. In that sense, being the …
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs
Application repackaging is a severe threat to Android users and the market. Not only does it
infringe on intellectual property, but it is also one of the most common ways of propagating …
infringe on intellectual property, but it is also one of the most common ways of propagating …
" Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
L Shi, J Fu, Z Guo, J Ming - Proceedings of the 17th Annual International …, 2019 - dl.acm.org
Recent developed application-level virtualization brings a groundbreaking innovation to
Android ecosystem: a host app is able to load and launch arbitrary guest APK files without …
Android ecosystem: a host app is able to load and launch arbitrary guest APK files without …