Obfuscation Resilient Search through Executable Classification

6 Jun 2018 Fang-Hsiang Su Jonathan Bell Gail Kaiser Baishakhi Ray

Android applications are usually obfuscated before release, making it difficult to analyze them for malware presence or intellectual property violations. Obfuscators might hide the true intent of code by renaming variables and/or modifying program structures... (read more)

PDF Abstract

Categories


  • SOFTWARE ENGINEERING
  • CRYPTOGRAPHY AND SECURITY