Field experience with obfuscating million‐user iOS apps in large enterprise mobile development

作者: Pei Wang , Dinghao Wu , Zhaofeng Chen , Tao Wei

DOI: 10.1002/SPE.2648

关键词:

摘要:

参考文章(50)
Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh, A Study of the Packer Problem and Its Solutions recent advances in intrusion detection. pp. 98- 115 ,(2008) , 10.1007/978-3-540-87403-4_6
Saumya K. Debray, Gregory R. Andrews, Igor V. Popov, Binary obfuscation using signals usenix security symposium. pp. 19- ,(2007)
Mohit Tiwari, Ashay Rane, Calvin Lin, Raccoon: closing digital side-channels through obfuscated execution usenix security symposium. pp. 431- 446 ,(2015)
Sebastian Banescu, Alexander Pretschner, Martin Ochoa, A framework for measuring software obfuscation resilience against automated attacks Proceedings of the 1st International Workshop on Software Protection. pp. 45- 51 ,(2015) , 10.5555/2821429.2821442
Mariano Ceccato, Massimiliano Di Penta, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella, A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques Empirical Software Engineering. ,vol. 19, pp. 1040- 1074 ,(2014) , 10.1007/S10664-013-9248-X
Haoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen, WuKong: a scalable and accurate two-phase approach to Android app clone detection international symposium on software testing and analysis. pp. 71- 82 ,(2015) , 10.1145/2771783.2771795
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huang, Pen-chung Yew, Control flow obfuscation with information flow tracking Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture - Micro-42. pp. 391- 400 ,(2009) , 10.1145/1669112.1669162
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu, LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code computer and communications security. pp. 757- 768 ,(2015) , 10.1145/2810103.2813617
Guillaume Bonfante, Jose Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry, CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions computer and communications security. pp. 745- 756 ,(2015) , 10.1145/2810103.2813627
Mooly Sagiv, Thomas Reps, Reinhard Wilhelm, Solving shape-analysis problems in languages with destructive updating ACM Transactions on Programming Languages and Systems. ,vol. 20, pp. 1- 50 ,(1998) , 10.1145/271510.271517