A growing trend in repackaging attacks exploits the Android virtualization technique, in which malicious code can run together with the victim app in a virtual container. In such a scenario, the attacker can directly build a malicious container capable of hosting the victim app instead of tampering with it, thus neglecting any anti-repackaging protection developed so far. Also, existing anti-virtualization techniques are ineffective since the malicious container can intercept - and tamper with - such controls at runtime. So far, only two solutions have been specifically designed to address virtualization-based repackaging attacks. However, their effectiveness is limited since they both rely on static taint analysis, thus not being able to e...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Application marketplaces are the main software distribution mechanism for modern mobile devices but ...
There have been many research efforts to secure Android applications and the high-level system mecha...
A growing trend in repackaging attacks exploits the Android virtualization technique, in which malic...
App repackaging remains a serious threat to the emerging mobile app ecosystem. Previous solutions ha...
Application repackaging is a severe problem for Android systems. Many Android malware programs pass ...
Application repackaging is a severe problem for Android systems. Many Android malware programs pass ...
Apps repackaged through reverse engineering pose a significant security threat to the Android smart ...
In this thesis, we investigate different possibilities to protect the Android ecosystem better. We f...
App repackaging refers to the practice of customizing an existing mobile app and redistributing it i...
In recent years, as mobile smart device sales grow quickly, the development of mobile applications (...
AbstractGoogle Play is the official market of Android apps. The app publishers make money by selling...
The Android ecosystem gained a huge popularity and market share owing to wider compatibility and its...
Abstract—The design of the Android system allows applica-tions to load additional code from external...
The huge benefit of mobile application industry has attracted a large number of developers and atten...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Application marketplaces are the main software distribution mechanism for modern mobile devices but ...
There have been many research efforts to secure Android applications and the high-level system mecha...
A growing trend in repackaging attacks exploits the Android virtualization technique, in which malic...
App repackaging remains a serious threat to the emerging mobile app ecosystem. Previous solutions ha...
Application repackaging is a severe problem for Android systems. Many Android malware programs pass ...
Application repackaging is a severe problem for Android systems. Many Android malware programs pass ...
Apps repackaged through reverse engineering pose a significant security threat to the Android smart ...
In this thesis, we investigate different possibilities to protect the Android ecosystem better. We f...
App repackaging refers to the practice of customizing an existing mobile app and redistributing it i...
In recent years, as mobile smart device sales grow quickly, the development of mobile applications (...
AbstractGoogle Play is the official market of Android apps. The app publishers make money by selling...
The Android ecosystem gained a huge popularity and market share owing to wider compatibility and its...
Abstract—The design of the Android system allows applica-tions to load additional code from external...
The huge benefit of mobile application industry has attracted a large number of developers and atten...
Mobile devices are increasingly being embraced by both organizations and individuals in today’s soci...
Application marketplaces are the main software distribution mechanism for modern mobile devices but ...
There have been many research efforts to secure Android applications and the high-level system mecha...