Proceedings of the 1st International Workshop on Advances in Mobile App Analysis 2018
DOI: 10.1145/3243218.3243224
|View full text |Cite
|
Sign up to set email alerts
|

Repackman: a tool for automatic repackaging of Android apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Feature-based attacks are implemented easily and automatically by an ML [45]- [49]. However, when implementing the changes into an application, the functionality of the app can be severely damaged [23], [30], [50], [51]. As this study implements problem-based EAs, the focus of Section II-B is problembased EAs.…”
Section: Related Workmentioning
confidence: 99%
“…Feature-based attacks are implemented easily and automatically by an ML [45]- [49]. However, when implementing the changes into an application, the functionality of the app can be severely damaged [23], [30], [50], [51]. As this study implements problem-based EAs, the focus of Section II-B is problembased EAs.…”
Section: Related Workmentioning
confidence: 99%
“…The mining code packaged as an application (app for short) can be more persistent than website visits, by running in the background and when the user is not present. The cost of creating and distributing a miner is negligible, given the ease of application repackaging [32] on Android and the availability of mining libraries [20]. But miners are particularly dangerous for mobile devices.…”
Section: Introductionmentioning
confidence: 99%
“…The feature-based attacks can be generated automatically by an ML [46], [47], [48], [49], [50]. Still, the correlated code in the sample that needs to be changed according to these attacks may severely damage the functionality of the sample [51], [52], [53], [54]. Therefore, feature-based evasion attacks are less realizable.…”
Section: Related Workmentioning
confidence: 99%