2018
DOI: 10.1007/978-3-030-05171-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Towards Accuracy in Similarity Analysis of Android Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“… Software: The rapid pace of how the software is being used makes it almost impossible not to use open forums/repositories to solve our needs. This creates software security breaches that compromise user data even on data in transit [ 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Malware: In recent years, companies have been attacked with malware.…”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“… Software: The rapid pace of how the software is being used makes it almost impossible not to use open forums/repositories to solve our needs. This creates software security breaches that compromise user data even on data in transit [ 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Malware: In recent years, companies have been attacked with malware.…”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%
“…This changes can then be classified by degree of importance. A recent work from Sreesh Kishore et al [ 31 ] proposes a system that uses NCD to compute the app lineage or detect malicious components in applications, because they use birthmarks from 60 APK. Birthmarks are intrinsic characteristics of an application that can be uniquely identified.…”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%