[1] |
E. Ravenscraft. ( 2012, Jul. 31). Just how bad is app piracy on android anyway? Hint: we’re asking the wrong question. [Online]. Available:
|
[2] |
M. T Yuan , “China Mobile Payment Security Report,” Business Culture, pp. 54-56, May 2014.
|
[3] |
Y. C. Moon, J. H. Noh, A. R. Kim , et al., “Design of copy protection system for android platform,” in International Conference on Information Technology, System and Management, Chongqing, China, 2012.
|
[4] |
Y. S. Jeong, J. C. Moon, D. Kim , et al., “An anti-piracy mechanism based on class separation and dynamic loading for android application,” in ACM Research in Applied Computation Symposium, San Antonio, USA, 2012, pp. 328-332. doi: 10.1145/2401603.2401674.
|
[5] |
C. Collberg, C. Thomborso, D. Low. (1997). A taxonomy of obfuscating transformations [Online]. Available:
|
[6] |
B. Yadegari, B. Johannesmeyer, B. Whitely, S. Debray , “A generic approach to automatic deobfuscation of executable code,” in IEEE Symposium on Security and Privacy, San Jose, USA, pp. 674-691, 2015. doi: 10.1109/SP.2015.47.
|
[7] |
W. Zhou, Y. Zhou, M. Grace, X. Jiang, S. Zou , “Fast, scalable detection of ‘piggybacked’ mobile application,” in ACM Conference on Data and Application Security and Privacy, San Antonio, USA, pp. 185-196, 2013. doi: 10.1145/2435349.2435377.
|
[8] |
W. Zhou, X. Zhang, X. Jiang , “AppInk: watermarking android apps for repackaging deterrence,” in Proc. 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASLA CCS’13), Hangzhou, China, pp. 1-12, 2013. doi: 10.1145/2484313.2484315.
|
[9] |
Z. J. Dong, W. Wang, H. Li , et al., “SeSoa: security enhancement system with online authentication for android APK,” ZTE Communications, vol. 14, no.S0,pp. 44-50, Jun. 2016. doi: 10.3969/j.issn.1673-5188.2016.S0.005.
|
[10] |
R. X. Fan, D. Y. Fang, Z. Y. Tang , et al., “A method of preventing android app repackaging based on code splitting,” Journal of Chinese Mini-Micro Computer Systems, vol. 37, no.9,pp. 1969-1974, Sept. 2016.
|