Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code, ACM SIGSAC Conference on Computer and Communications Security, pp.1137-1150, 2018. ,
Malton: Towards on-device non-invasive mobile malware analysis for art, USENIX Security Symposium, pp.289-306, 2017. ,
On tracking information flows through jni in android applications, IEEE/IFIP International Conference on Dependable Systems and Networks, pp.180-191, 2014. ,
, Android compatibility definition document, 2020.
Androzoo: Collecting millions of android apps for the research community, International Conference on Mining Software Repositories, pp.468-471, 2016. ,
Deep ground truth analysis of current android malware1, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.252-276, 2017. ,
Automated attacker correlation for malicious code, Tech. Rep, 2010. ,
Structural comparison of executable objects, Detection of Intrusions and Malware & Vulnerability Assessment, pp.161-173, 2004. ,
, JNI tips, 2019.
Droidpro: An aotc-based bytecodehiding scheme for packing the android applications, IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ IEEE International Conference On Big Data Science And Engineering, pp.624-632, 2018. ,
Dexhunter: toward extracting hidden code from packed android applications, European Symposium on Research in Computer Security, pp.293-311, 2015. ,
Appspear: Bytecode decrypting and dex reassembling for packed android malware, International Symposium on Recent Advances in Intrusion Detection, pp.359-381, 2015. ,
Automated detection and classification for packed android applications, International Conference on Mobile Services, pp.200-203, 2016. ,
Adaptive unpacking of android apps, International Conference on Software Engineering, pp.358-369, 2017. ,
Tackling runtime-based obfuscation in android with tiro, USENIX Security Symposium, pp.1247-1262, 2018. ,
Things you may not know about android (un) packers: A systematic study based on whole-system emulation, Network and Distributed System Security Symposium, 2018. ,
, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, G. Mc-Graw, 2009.
X. on the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling, The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol.50, issue.302, pp.157-175, 1900.,
URL : https://hal.archives-ouvertes.fr/hal-01225627