Zobrazeno 1 - 10
of 132
pro vyhledávání: '"Barbara G. Ryder"'
Autor:
Barbara G. Ryder, Haipeng Cai
Publikováno v:
IEEE Transactions on Software Engineering. 47:2934-2955
With the rise of the mobile computing market, Android has received tremendous attention from both academia and industry. Application programming in Android is known to have unique characteristics, and Android apps be particularly vulnerable to variou
Publikováno v:
IEEE Transactions on Mobile Computing. 19:90-102
Malware collusion is a technique utilized by attackers to evade standard detection. It is a new threat where two or more applications, appearing benign, communicate to perform a malicious task. Most proposed approaches aim at detecting stand-alone ma
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 17:64-77
During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification techniques, partly because of their behavioral similarities to ben
Publikováno v:
IEEE Transactions on Information Forensics and Security. 14:1455-1470
Most existing Android malware detection and categorization techniques are static approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program behaviors, dynamic approaches are potentially more resilient against these attac
Publikováno v:
Code Clone Analysis ISBN: 9789811619267
Code Clone Analysis
Code Clone Analysis
To facilitate clone maintenance, various automated tools were proposed to detect code clones by identifying similar token sequences or similar program syntactic structures in source code. They achieved different trade-offs between precision and recal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::20cd5275717fe64183903d5defb3ba69
https://doi.org/10.1007/978-981-16-1927-4_6
https://doi.org/10.1007/978-981-16-1927-4_6
Publikováno v:
Computers & Security. 92:101750
There have been extensive investigations on identifying sensitive data flows in Android apps for detecting malicious behaviors. Typical real world apps have a large number of sensitive flows and sinks. Thus, security analysts need to prioritize these
Publikováno v:
FEAST@CCS
Security transformation is to transfer applications to meet security guarantees. How to prioritize Android apps and find suitable transformation options is a challenging problem. Typical real-world apps have a large number of sensitive flows and sink
Publikováno v:
Software: Practice and Experience. 46:867-889
Despite the popularity of JavaScript for client-side web applications, there is a lack of effective software tools supporting JavaScript development and testing. The dynamic characteristics of JavaScript pose software engineering challenges such as p
Publikováno v:
Computers & Security. 49:255-273
As mobile computing becomes an integral part of the modern user experience, malicious applications have infiltrated open marketplaces for mobile platforms. Malware apps stealthily launch operations to retrieve sensitive user or device data or abuse s
Publikováno v:
ICSME
Programmers produce code clones when developing software. By copying and pasting code with or without modification, developers reuse existing code to improve programming productivity. However, code clones present challenges to software maintenance: t