Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
Semantics-aware android malware classification using weighted contextual api dependency graphs
The drastic increase of Android malware has led to a strong interest in develo** methods
to automate the malware analysis process. Existing automated Android malware detection …
to automate the malware analysis process. Existing automated Android malware detection …
Composite constant propagation: Application to android inter-component communication analysis
Many program analyses require statically inferring the possible values of composite types.
However, current approaches either do not account for correlations between object fields or …
However, current approaches either do not account for correlations between object fields or …
Iccdetector: Icc-based malware detection on android
Most existing mobile malware detection methods (eg, Kirin and DroidMat) are designed
based on the resources required by malwares (eg, permissions, application programming …
based on the resources required by malwares (eg, permissions, application programming …
Securing android: a survey, taxonomy, and challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …
on Android. However, Android's widespread adoption is marred with increasingly rampant …
Droidra: Taming reflection to support whole-program analysis of android apps
Android developers heavily use reflection in their apps for legitimate reasons, but also
significantly for hiding malicious actions. Unfortunately, current state-of-the-art static analysis …
significantly for hiding malicious actions. Unfortunately, current state-of-the-art static analysis …
[PDF][PDF] Harvesting runtime values in Android applications that feature anti-analysis techniques.
It is generally challenging to tell apart malware from benign applications. To make this
decision, human analysts are frequently interested in runtime values: targets of reflective …
decision, human analysts are frequently interested in runtime values: targets of reflective …
Code injection attacks on html5-based mobile apps: Characterization, detection and mitigation
Due to the portability advantage, HTML5-based mobile apps are getting more and more
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …
popular. Unfortunately, the web technology used by HTML5-based mobile apps has a …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …