Signing Your Applications ,
Reverse engineering, Malware and goodware of Android applications ,
AdRob: Examining the Landscape and Impact of Android Application Plagiarism, 11th International Conference on Mobile Systems, Applications and Services (Mobisys, pp.431-444, 2013. ,
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012. ,
DOI : 10.1109/SP.2012.16
DroidMoss: Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces, 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pp.317-326, 2012. ,
Fast, Scalable Detection of Piggybacked Mobile Applications, 3rd ACM conference on Data and application security and privacy (CODASPY), pp.185-196, 2013. ,
AnDarwin: Scalable Semantics-Based Detection of Similar Android Applications, 18th European Symposium on Research in Computer Security (ESORICS), pp.182-199, 2013. ,
A framework for evaluating mobile app repackaging detection, 6th International Conference on Trust and Trustworthy Computing (TRUST), pp.169-186, 2013. ,
DroidChameleon: evaluating Android antimalware against transformation attacks, 8th ACM SIGSAC Symposium on Information , Computer and Communications Security (ASIACCS), pp.329-334, 2013. ,
Attack of the Clones: Detecting Cloned Applications on Android Markets, 17th European Symposium on Research in Computer Security (ESORICS), pp.37-55, 2012. ,
Plagiarizing smartphone applications: attack strategies and defense techniques, 4th International Symposium on Engineering Secure Software and Systems (ESSoS), pp.106-120, 2012. ,
A (sub)graph isomorphism algorithm for matching large graphs, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), pp.1367-1372, 2004. ,
Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications, 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), pp.62-81, 2012. ,
Winnowing: Local Algorithms for Document Fingerprinting, ACM SIGMOD International Conference on Management of Data (SIGMOD), pp.76-85, 2003. ,
ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-Virus Systems, 9th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), pp.82-101, 2012. ,
Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs, 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.181-189, 2011. ,