Abusing android runtime for application obfuscation

P Graux, JF Lalande, P Wilke… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

Abusing Android Runtime for Application Obfuscation

P Graux, JF Lalande, P Wilke… - SAD 2020-Workshop …, 2020 - centralesupelec.hal.science
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

Abusing Android Runtime for Application Obfuscation

P Graux, JF Lalande, P Wilke, VVT Tong - SAD 2020-Workshop on …, 2020 - hal.science
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

Abusing Android Runtime for Application Obfuscation

P Graux, JF Lalande, P Wilke… - SAD 2020-Workshop on …, 2020 - inria.hal.science
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

Abusing Android Runtime for Application Obfuscation

P Graux, JF Lalande, P Wilke… - SAD 2020-Workshop …, 2020 - insa-rennes.hal.science
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

Abusing Android Runtime for Application Obfuscation

P Graux, JF Lalande, P Wilke, VVT Tong - 2020 - conferences.computer.org
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

Abusing Android Runtime for Application Obfuscation

P Graux, JF Lalande, P Wilke… - 2020 IEEE European …, 2020 - computer.org
Studying Android obfuscation techniques is an essential task for understanding and
analyzing malicious applications. Obfuscation techniques have already been extensively …

[引用][C] Abusing Android Runtime for Application Obfuscation

P Graux, JF Lalande, P Wilke, VVT Tong