Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. Abstract: The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a large user base.
Jan 20, 2017
The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a ...
People also ask
Understanding Android app piggybacking: A systematic study of malicious code grafting ; Discipline. Information Security | Software Engineering ; Research Areas.
The piggybacking process involves in selecting a given orig- inal app, referred to in the literature [3] as the carrier, and grafting to it a malicious code, ...
Jun 1, 2017 · The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be ...
We fill this gap by: 1) systematically building a large set of piggybacked and benign apps pairs, which we release to the community; 2) empirically studying the ...
Feb 24, 2016 · Abstract—The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can.
The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a ...
May 20, 2017 · Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. The Android packaging model offers ample opportunities ...
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting · Projects · Search results · Cookie Preference Centre.