2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2016
DOI: 10.1109/dsn.2016.56
|View full text |Cite
|
Sign up to set email alerts
|

Repackage-Proofing Android Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…ViewDroid [23] applied a user interface-based birthmark, which is designed for user interaction intensive and event dominated programs, to detect smartphone application plagiarism. Luo et al [24] proposed a repackage-proofing method to protect Android apps.…”
Section: A Software Plagiarism Detectionmentioning
confidence: 99%
“…ViewDroid [23] applied a user interface-based birthmark, which is designed for user interaction intensive and event dominated programs, to detect smartphone application plagiarism. Luo et al [24] proposed a repackage-proofing method to protect Android apps.…”
Section: A Software Plagiarism Detectionmentioning
confidence: 99%
“…Therefore the guarded code cannot be decrypted and executed. Inserting checks in legitimate apps is promising for protecting Android apps from malware developers and has well been studied in the literature [42].…”
Section: Related Workmentioning
confidence: 99%
“…We test QEMU as it is one of the state-of-the-art emulators, which is well maintained and used by many industry tools (e.g., Android Studio) and academic prototypes [14,18,44,9,40,10,12,21,11,16,31]. However, EXAMINER can also be used to test the other emulators.…”
Section: Other Emulators and Architecturesmentioning
confidence: 99%
“…Nevertheless, software emulation complements the hardware-based tracing and provides rich functionalities that dynamic analysis systems can build upon. Indeed, many dynamic analysis frameworks [14,18,44,9,40,10,12,21,11,16,31,26,22] are built based on the state-of-the-art CPU emulator, i.e., QEMU, to conduct malware analysis, live-patching, crash analysis and etc. Meanwhile, many fuzzing tools utilize CPU emulators to fuzz binaries, e.g., the QEMU mode of AFL [2], FirmAFL [45], P2IM [15], HALucinator [13] and TriforceAFL [7].…”
Section: Introductionmentioning
confidence: 99%