[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Jung et al., 2013 - Google Patents

Repackaging attack on android banking applications and its countermeasures

Jung et al., 2013

View HTML
Document ID
16041636174225188757
Author
Jung J
Kim J
Lee H
Yi J
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Although anyone can easily publish Android applications (or apps) in an app marketplace according to an open policy, decompiling the apps is also easy due to the structural characteristics of the app building process, making them very vulnerable to forgery or …
Continue reading at link.springer.com (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Jung et al. Repackaging attack on android banking applications and its countermeasures
Sihag et al. A survey of android application and malware hardening
Sufatrio et al. Securing android: a survey, taxonomy, and challenges
Rashidi et al. A Survey of Android Security Threats and Defenses.
Faruki et al. Android security: a survey of issues, malware penetration, and defenses
Ghafari et al. Security smells in android
Mylonas et al. Smartphone security evaluation the malware attack case
Fang et al. Permission based Android security: Issues and countermeasures
Backes et al. Appguard–fine-grained policy enforcement for untrusted android applications
Piao et al. Server‐based code obfuscation scheme for APK tamper detection
Blasco et al. Automated generation of colluding apps for experimental research
Liebergeld et al. Android security, pitfalls and lessons learned
Gadyatskaya et al. Security in the Firefox OS and Tizen mobile platforms
Akhawe et al. Data-confined HTML5 applications
Albakri et al. Survey on Reverse‐Engineering Tools for Android Mobile Devices
Lim et al. Structural analysis of packing schemes for extracting hidden codes in mobile malware
Davidson et al. Secure integration of web content and applications on commodity mobile operating systems
Negi et al. A review and Case Study on android malware: Threat model, attacks, techniques and tools
Maass et al. In-nimbo sandboxing
Chang et al. Towards a multilayered permission‐based access control for extending Android security
Latifa Android: Deep look into dalvik vm
Khadiranaikar et al. Improving Android application security for intent based attacks
Cho et al. A strengthened android signature management method
Pei et al. ASCAA: API‐level security certification of android applications
Muthumanickam et al. A collaborative policy-based security scheme to enforce resource access controlling mechanism