G. Inc, Signing Your Applications

. Androguard, Reverse engineering, Malware and goodware of Android applications

G. Clint, S. Ryan, C. Jonathan, C. Hao, Z. Hui et al., AdRob: Examining the Landscape and Impact of Android Application Plagiarism, 11th International Conference on Mobile Systems, Applications and Services (Mobisys, pp.431-444, 2013.

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012.
DOI : 10.1109/SP.2012.16

Z. Wu, Z. Yajin, J. Xuxian, and N. Peng, DroidMoss: Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces, 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pp.317-326, 2012.

Z. Wu, Z. Yanjing, G. Michael, J. Xuxian, and Z. Shihong, Fast, Scalable Detection of Piggybacked Mobile Applications, 3rd ACM conference on Data and application security and privacy (CODASPY), pp.185-196, 2013.

C. Jonathan, G. Clint, and C. Hao, AnDarwin: Scalable Semantics-Based Detection of Similar Android Applications, 18th European Symposium on Research in Computer Security (ESORICS), pp.182-199, 2013.

H. Heqing, Z. Sencun, L. Peng, . Dinghao, and . Wu, A framework for evaluating mobile app repackaging detection, 6th International Conference on Trust and Trustworthy Computing (TRUST), pp.169-186, 2013.

R. Vaibhav, C. Yan, and J. Xuxian, DroidChameleon: evaluating Android antimalware against transformation attacks, 8th ACM SIGSAC Symposium on Information , Computer and Communications Security (ASIACCS), pp.329-334, 2013.

C. Jonathan, G. Clint, and C. Hao, Attack of the Clones: Detecting Cloned Applications on Android Markets, 17th European Symposium on Research in Computer Security (ESORICS), pp.37-55, 2012.

P. Rahul, N. Andrew, N. Crisina, and Z. Xiangyu, Plagiarizing smartphone applications: attack strategies and defense techniques, 4th International Symposium on Engineering Secure Software and Systems (ESSoS), pp.106-120, 2012.

P. Liugi, F. Pasquale, S. Carlo, and V. Mario, A (sub)graph isomorphism algorithm for matching large graphs, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), pp.1367-1372, 2004.

H. Steve, H. Ling, W. Edward, L. Saung, C. Charles et al., Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications, 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), pp.62-81, 2012.

S. Saul, S. Danial, and A. Alex, Winnowing: Local Algorithms for Document Fingerprinting, ACM SIGMOD International Conference on Management of Data (SIGMOD), pp.76-85, 2003.

Z. Min, P. Patrick, and C. John, ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-Virus Systems, 9th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), pp.82-101, 2012.

C. Silvio and X. Yang, Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs, 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.181-189, 2011.