Juxtapp: a scalable system for detecting code reuse among android applications

作者: Steve Hanna , Ling Huang , Edward Wu , Saung Li , Charles Chen

DOI: 10.1007/978-3-642-37300-8_4

关键词:

摘要: … in detecting common code (or code similarity) may … code reuse in Android applications which allows for 1) early detection and developer notification of known vulnerable or buggy code, …

参考文章(31)
Ibai Gurrutxaga, Olatz Arbelaitz, José I. Martín, Javier Muguerza, Jesús M. Pérez, Iñigo Perona, SIHC: A STABLE INCREMENTAL HIERARCHICAL CLUSTERING ALGORITHM Proceedings of the 11th International Conference on Enterprise Information. pp. 300- 304 ,(2009) , 10.5220/0001857103000304
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Andrew Walenstein, Arun Lakhotia, The Software Similarity Problem in Malware Analysis dagstuhl seminar proceedings. pp. 0- ,(2007)
Raghavan Komondoor, Susan Horwitz, Using Slicing to Identify Duplication in Source Code static analysis symposium. pp. 40- 56 ,(2001) , 10.1007/3-540-47764-0_3
Udi Manber, Brenda S. Baker, Deducing similarities in Java sources from bytecodes usenix annual technical conference. pp. 15- 15 ,(1998)
Debin Gao, Michael K. Reiter, Dawn Song, BinHunt: Automatically Finding Semantic Differences in Binary Programs international conference on information and communication security. pp. 238- 255 ,(2008) , 10.1007/978-3-540-88625-9_16
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, Engin Kirda, Scalable, behavior-based malware clustering network and distributed system security symposium. ,(2009)
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Jiyong Jang, David Brumley, Shobha Venkataraman, BitShred Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 309- 320 ,(2011) , 10.1145/2046707.2046742