Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

MD Preda, F Maggi - Journal of Computer Virology and Hacking …, 2017 - Springer
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

M Dalla Preda, F Maggi - Journal of Computer Virology and Hacking …, 2016 - infona.pl
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

M DALLA PREDA, F Maggi - JOURNAL OF COMPUTER VIROLOGY …, 2016 - iris.univr.it
The authors of mobile-malware have started to leverage program protection techniques to
circumvent anti-viruses, or simply hinder reverse engineering. In response to the diffusion of …

[PDF][PDF] Mila Dalla Preda & Federico Maggi

maggi.cc
The authors of mobile-malware have started to leverage program protection techniques to
circumvent antiviruses, or simply hinder reverse engineering. In response to the diffusion of …