Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing 2022
DOI: 10.1145/3477314.3507143
|View full text |Cite
|
Sign up to set email alerts
|

R&R tool for Android applications hiding malicious features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…For example, Maik deploys a program on two different systems, records its execution, and compares the two execution traces upon replay to verify the correctness of the program [11]. Lee et al propose a tool for recording and replaying Android APIs to analyze the evasion techniques used in sophisticated malware [12]. Wang et al present Pinpoint, a system that records execution of the program (including user inputs and graphical output) and replays the output [14].…”
Section: Record/replay Techniquesmentioning
confidence: 99%
“…For example, Maik deploys a program on two different systems, records its execution, and compares the two execution traces upon replay to verify the correctness of the program [11]. Lee et al propose a tool for recording and replaying Android APIs to analyze the evasion techniques used in sophisticated malware [12]. Wang et al present Pinpoint, a system that records execution of the program (including user inputs and graphical output) and replays the output [14].…”
Section: Record/replay Techniquesmentioning
confidence: 99%