Jung et al., 2013 - Google Patents
Repackaging attack on android banking applications and its countermeasuresJung et al., 2013
View HTML- Document ID
- 16041636174225188757
- Author
- Jung J
- Kim J
- Lee H
- Yi J
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Although anyone can easily publish Android applications (or apps) in an app marketplace according to an open policy, decompiling the apps is also easy due to the structural characteristics of the app building process, making them very vulnerable to forgery or …
- 238000000034 method 0 abstract description 29
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jung et al. | Repackaging attack on android banking applications and its countermeasures | |
Sihag et al. | A survey of android application and malware hardening | |
Sufatrio et al. | Securing android: a survey, taxonomy, and challenges | |
Rashidi et al. | A Survey of Android Security Threats and Defenses. | |
Faruki et al. | Android security: a survey of issues, malware penetration, and defenses | |
Ghafari et al. | Security smells in android | |
Mylonas et al. | Smartphone security evaluation the malware attack case | |
Fang et al. | Permission based Android security: Issues and countermeasures | |
Backes et al. | Appguard–fine-grained policy enforcement for untrusted android applications | |
Piao et al. | Server‐based code obfuscation scheme for APK tamper detection | |
Blasco et al. | Automated generation of colluding apps for experimental research | |
Liebergeld et al. | Android security, pitfalls and lessons learned | |
Gadyatskaya et al. | Security in the Firefox OS and Tizen mobile platforms | |
Akhawe et al. | Data-confined HTML5 applications | |
Albakri et al. | Survey on Reverse‐Engineering Tools for Android Mobile Devices | |
Lim et al. | Structural analysis of packing schemes for extracting hidden codes in mobile malware | |
Davidson et al. | Secure integration of web content and applications on commodity mobile operating systems | |
Negi et al. | A review and Case Study on android malware: Threat model, attacks, techniques and tools | |
Maass et al. | In-nimbo sandboxing | |
Chang et al. | Towards a multilayered permission‐based access control for extending Android security | |
Latifa | Android: Deep look into dalvik vm | |
Khadiranaikar et al. | Improving Android application security for intent based attacks | |
Cho et al. | A strengthened android signature management method | |
Pei et al. | ASCAA: API‐level security certification of android applications | |
Muthumanickam et al. | A collaborative policy-based security scheme to enforce resource access controlling mechanism |