Author of the publication

DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.

, , , and . AsiaCCS, page 353-358. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replacement Attacks on Behavior Based Software Birthmark., , , , , , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 1-16. Springer, (2011)Automatic construction of printable return-oriented programming payload., , , , and . MALWARE, page 18-25. IEEE Computer Society, (2014)Detect Android Malware Variants Using Component Based Topology Graph., , , , and . TrustCom, page 406-413. IEEE Computer Society, (2014)Replacement attacks: automatically evading behavior-based software birthmark., , , , , , and . Int. J. Inf. Sec., 11 (5): 293-304 (2012)Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation., , , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 181-195. Springer, (2010)Research and application of Web network attack protection and block chain log storage based on software definition., , and . CITS, page 1-5. IEEE, (2020)BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability., , , , and . ARES, page 208-215. IEEE Computer Society, (2009)Analytical Expression of the Mirror Coefficient by Joint Analytical Calculation Method., , , , , and . IEEE Trans. Ind. Informatics, 20 (4): 6119-6129 (April 2024)DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware., , , and . AsiaCCS, page 353-358. ACM, (2013)Defensor: Lightweight and Efficient Security-Enhanced Framework for Android., , , , and . TrustCom, page 260-267. IEEE Computer Society, (2014)