2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2020
DOI: 10.1109/scam51674.2020.00021
|View full text |Cite
|
Sign up to set email alerts
|

DroidXP: A Benchmark for Supporting the Research on Mining Android Sandboxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Among them, Android is the most widely used (Agrawal & Trivedi, 2019). The popularity of the Android system has opened the door for attackers to increase the number of threats to Android devices (da Costa et al, 2020). According to the McAfee Labs Threats' report in the first quarter of 2020, 98% of attackers target Android devices (Bayazit, Sahingoz, & Dogan, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…Among them, Android is the most widely used (Agrawal & Trivedi, 2019). The popularity of the Android system has opened the door for attackers to increase the number of threats to Android devices (da Costa et al, 2020). According to the McAfee Labs Threats' report in the first quarter of 2020, 98% of attackers target Android devices (Bayazit, Sahingoz, & Dogan, 2020).…”
Section: Introductionmentioning
confidence: 99%