Добірка наукової літератури з теми "REPACKAGING DETECTION"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "REPACKAGING DETECTION".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "REPACKAGING DETECTION"

1

Rastogi, Sajal, Kriti Bhushan, and B. B. Gupta. "Android Applications Repackaging Detection Techniques for Smartphone Devices." Procedia Computer Science 78 (2016): 26–32. http://dx.doi.org/10.1016/j.procs.2016.02.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lee, Gi Seong, and Huy Kang Kim. "Android Game Repackaging Detection Technique using Shortened Instruction Sequence." Journal of Korea Game Society 13, no. 6 (December 20, 2013): 85–94. http://dx.doi.org/10.7583/jkgs.2013.13.6.85.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gurulian, Iakovos, Konstantinos Markantonakis, Lorenzo Cavallaro, and Keith Mayes. "You can’t touch this: Consumer-centric android application repackaging detection." Future Generation Computer Systems 65 (December 2016): 1–9. http://dx.doi.org/10.1016/j.future.2016.05.021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Jaewoo Shim, Minjae Park, Seong-je Cho, Minkyu Park, and Sangchul Han. "Dynamic Analysis of Android Apps written with PhoneGap Cross-Platform Framework." Research Briefs on Information and Communication Technology Evolution 4 (August 15, 2018): 18–27. http://dx.doi.org/10.56801/rebicte.v4i.62.

Повний текст джерела
Анотація:
In this paper, we propose an effective technique that can perform dynamic analysis for Android appwritten with PhoneGap cross-platform framework. For a systematic study, we have written a maliciousAndroid app using PhoneGap framework. We compare the structural differences between abasic Android app (a native app) and the other malicious Android app built in release mode on Phone-Gap framework, and also analyze the malicious app dynamically. The proposed technique first copiesthe web root directory of the target malicious app into a writable directory inside the smartphone.When the app is executed, its web pages and Javascript files are loaded from the copied directoryusing a dynamic instrumentation. Finally, we dynamically change the flag for WebView debuggingso that a remote debugger can successfully be attached to the app built in release mode. Using ourproposed technique, a malware analyst can debug a malicious PhoneGap app built in release modewithout repackaging, which cannot be debugged as it is by Chrome remote debugger. She/he canalso utilize the debugging features supported by the remote debugger. The technique allows the analystto bypass the repackaging detection method that malicious apps use to avoid antivirus detection.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Merlo, Alessio, Antonio Ruggia, Luigi Sciolla, and Luca Verderame. "ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection." Pervasive and Mobile Computing 76 (September 2021): 101443. http://dx.doi.org/10.1016/j.pmcj.2021.101443.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Cho, Haehyun, Jiwoong Bang, Myeongju Ji, and Jeong Hyun Yi. "Mobile application tamper detection scheme using dynamic code injection against repackaging attacks." Journal of Supercomputing 72, no. 9 (June 2, 2016): 3629–45. http://dx.doi.org/10.1007/s11227-016-1763-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Chen, Xiao, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, and Kui Ren. "Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection." IEEE Transactions on Information Forensics and Security 15 (2020): 987–1001. http://dx.doi.org/10.1109/tifs.2019.2932228.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Gurulian, Iakovos, Konstantinos Markantonakis, Lorenzo Cavallaro, and Keith Mayes. "Reprint of “You can’t touch this: Consumer-centric android application repackaging detection”." Future Generation Computer Systems 80 (March 2018): 537–45. http://dx.doi.org/10.1016/j.future.2017.11.011.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ma, Jun, Qing-Wei Sun, Chang Xu, and Xian-Ping Tao. "GridDroid—An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface." Journal of Computer Science and Technology 37, no. 1 (January 31, 2022): 147–81. http://dx.doi.org/10.1007/s11390-021-1659-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Albert, Valerie, Michael Lanz, Georgios Imanidis, Kurt E. Hersberger, and Isabelle Arnet. "Stability of medicines after repackaging into multicompartment compliance aids: eight criteria for detection of visual alteration." Drugs & Therapy Perspectives 33, no. 10 (July 26, 2017): 487–96. http://dx.doi.org/10.1007/s40267-017-0431-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "REPACKAGING DETECTION"

1

KUMAR, NIRAJ. "ANDROID APP REPACKAGING DETECTION USING SIGNING CERTIFICATE AND PERMISSIONS COMPARISON." Thesis, 2018. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19109.

Повний текст джерела
Анотація:
Android eco system works in two steps as far as an application developer is concerned. In the first step, developers design and develop an Android app and subsequently publish it on Google Play Store either as paid apps or with some advertisements to earn monetary benefit or sometimes as free app just for building user base. Besides the bona fide Android ecosystem, there is a parallel dark world of malicious attackers who repackage other developer's application (Free apps available in Play Store or other app stores) and publish it with their own name. Alternatively, they add advertisements with their own bank accounts or even add malicious code and use it for their own benefit. In a similar fashion, malicious attackers embed malware payload into the original applications so as to gain control of the mobile devices on which they are running to retrieve the private data of the user, stealthily read or send SMS messages to premium rate numbers, read banking credentials and so on. Although there are many identification methods which have been used traditionally to detect these repackaged applications existing in various Android app stores. However, it is not always effective to analyse any new application. Repackaged apps are a serious vulnerability these days in Android phones. Various threat mitigation measures have been devised like watermarking in case of rooted device. But, a defence mechanism that prohibits repackaged apps from running on a user device (non-rooted device) is not common. Our repackage-proofing technique for Android apps is trustworthy and covert. Repackaged apps present considerable challenge to the security and privacy of smartphone users. But fortunately such apps can be made to crash (randomly crash to confuse attackers) using keystore check as well as permissions added in repackaged code. Even other techniques like code obfuscation using ProGuard tool are helpful. It does not require any change at the Framework or System level. Private key used to sign the apk is with the original developer. Any app which is installed in an Android system need to pass signature validation. PackageManager API reads an apk and extracts the app information. It then saves the information in three different files on device path /data/system. Out of these three files, the most important is packages.xml. It contains key information like names, code paths, public keys, permissions, etc., 2 | P a g e for all the installed apps. PackageManager API is used to retrieve Kr from the file. We split this Kr value into 8 equal parts and store it as constants in different classes. At runtime, we merge these parts to recreate Kr and compare it with Kr value returned by making use of PackageManager. For repackaged apps as signing key has changed, the two Kr values will be different.
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "REPACKAGING DETECTION"

1

Guo, Junxia, Dongdong Liu, Rilian Zhao, and Zheng Li. "WLTDroid: Repackaging Detection Approach for Android Applications." In Web Information Systems and Applications, 579–91. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60029-7_52.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Guan, Quanlong, Heqing Huang, Weiqi Luo, and Sencun Zhu. "Semantics-Based Repackaging Detection for Mobile Apps." In Lecture Notes in Computer Science, 89–105. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30806-7_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Li, Jinghua, Xiaoyan Liu, Huixiang Zhang, and Dejun Mu. "A Scalable Cloud-Based Android App Repackaging Detection Framework." In Green, Pervasive, and Cloud Computing, 113–25. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39077-2_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gadyatskaya, Olga, Andra-Lidia Lezza, and Yury Zhauniarovich. "Evaluation of Resource-Based App Repackaging Detection in Android." In Secure IT Systems, 135–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47560-8_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Huang, Heqing, Sencun Zhu, Peng Liu, and Dinghao Wu. "A Framework for Evaluating Mobile App Repackaging Detection Algorithms." In Trust and Trustworthy Computing, 169–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38908-5_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jiao, Sibei, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng. "A Rapid and Scalable Method for Android Application Repackaging Detection." In Information Security Practice and Experience, 349–64. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17533-1_24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Jiao, Sibei, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng. "Erratum: A Rapid and Scalable Method for Android Application Repackaging Detection." In Information Security Practice and Experience, E1. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17533-1_39.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "REPACKAGING DETECTION"

1

Yue, Shengtao, Weizan Feng, Jun Ma, Yanyan Jiang, Xianping Tao, Chang Xu, and Jian Lu. "RepDroid: An Automated Tool for Android Application Repackaging Detection." In 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC). IEEE, 2017. http://dx.doi.org/10.1109/icpc.2017.16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zeng, Qiang, Lannan Luo, Zhiyun Qian, Xiaojiang Du, and Zhoujun Li. "Resilient decentralized Android application repackaging detection using logic bombs." In the 2018 International Symposium. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3179541.3168820.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zeng, Qiang, Lannan Luo, Zhiyun Qian, Xiaojiang Du, and Zhoujun Li. "Resilient decentralized Android application repackaging detection using logic bombs." In CGO '18: 16th Annual IEEE/ACM International Symposium on Code Generation and Optimization. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3168820.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Yuan, Cangzhou, Shenhong Wei, Chengjian Zhou, Jiangtao Guo, and Hongyue Xiang. "Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior Birthmark." In 2017 24th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2017. http://dx.doi.org/10.1109/apsec.2017.54.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Wolfgong, W. John, and James Izzo. "Materials Analyses for Parts Validation." In ISTFA 2015. ASM International, 2015. http://dx.doi.org/10.31399/asm.cp.istfa2015p0199.

Повний текст джерела
Анотація:
Abstract The most common methodologies for determining whether a component should be judged suspect counterfeit, or not, rely on visual examination, electrical test, and X-ray examinations. While these are commonly sufficient at such determinations, more thorough examinations may be pursued - in particular materials characterizations. In this paper, examples are given in which such “non-standard” methods are employed. Additionally, the results of an investigation as to the applicability of such methods towards detection of surface alteration to facilitate repackaging are described.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Parvin, Daniel F., and Thomas Huys. "Performance of a DrumScan® HRGS Solo Scanner for the Assay of Legacy Waste at the Belgoprocess Site." In ASME 2011 14th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2011. http://dx.doi.org/10.1115/icem2011-59122.

Повний текст джерела
Анотація:
On the sites of Belgoprocess several thousands of drums containing conditioned legacy waste are stored. A significant number of these waste packages are 220 litre drums containing radioactive waste embedded into inactive bitumen. Most of the radioactive waste in these drums was generated during the development and production of MOX-fuels and the operation of the Eurochemic reprocessing plant. The current state of a number of these packages is no longer acceptable for long term storage. In order to make the waste packages acceptable for interim storage a repackaging process was developed. The process involves the repackaging of the waste items into 400 or 700 litre waste drums and a non-destructive gamma-ray assay (NDA) measurement performed on the new package. The aim of the NDA measurement is to detect significant quantities of fissile material in order to demonstrate compliance with the operational limits of the storage building. Since the waste items are destined for geological disposal, there is no specific need for a detection limit in the order of milligrams of plutonium as required for surface disposal. To meet this NDA requirement Babcock International Group supplied, calibrated and commissioned an open geometry system from its HRGS product range. The DrumScan® HRGS Solo assay system was delivered to the Belgoprocess site in 2009 after completing a series of factory acceptance tests performed in the UK. In May 2009 after successful completion of the site acceptance tests performed in Belgium, the system has been undergoing extensive testing and validation by Belgoprocess in order to demonstrate acceptance and compliance to the Belgian Radioactive Waste Agency, NIRAS/ONDRAF. After a careful evaluation of the qualification file, NIRAS/ONDRAF approved the system for operational measurements at the end of 2010. This paper provides a detailed description of the NDA requirement, calibration methodology, system validation tests and overall measurement performance of the system.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hu, Wenjun, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, and Ting Han. "MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911805.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yue, Shengtao, Qingwei Sun, Jun Ma, Xianping Tao, Chang Xu, and Jian Lu. "RegionDroid: A Tool for Detecting Android Application Repackaging Based on Runtime UI Region Features." In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2018. http://dx.doi.org/10.1109/icsme.2018.00041.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Sharma, Shivam, Firoj Alam, Md Shad Akhtar, Dimitar Dimitrov, Giovanni Da San Martino, Hamed Firooz, Alon Halevy, Fabrizio Silvestri, Preslav Nakov, and Tanmoy Chakraborty. "Detecting and Understanding Harmful Memes: A Survey." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/781.

Повний текст джерела
Анотація:
The automatic identification of harmful content online is of major concern for social media platforms, policymakers, and society. Researchers have studied textual, visual, and audio content, but typically in isolation. Yet, harmful content often combines multiple modalities, as in the case of memes. With this in mind, here we offer a comprehensive survey with a focus on harmful memes. Based on a systematic analysis of recent literature, we first propose a new typology of harmful memes, and then we highlight and summarize the relevant state of the art. One interesting finding is that many types of harmful memes are not really studied, e.g., such featuring self-harm and extremism, partly due to the lack of suitable datasets. We further find that existing datasets mostly capture multi-class scenarios, which are not inclusive of the affective spectrum that memes can represent. Another observation is that memes can propagate globally through repackaging in different languages and that they can also be multilingual, blending different cultures. We conclude by highlighting several challenges related to multimodal semiotics, technological constraints, and non-trivial social engagement, and we present several open-ended aspects such as delineating online harm and empirically examining related frameworks and assistive interventions, which we believe will motivate and drive future research.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Thornley, David John, Kareena McCrindle, Stephen Rayner, Jonathan Sharpe, Czeslaw Pienkowski, and Carl Phillips. "The Application of Additional, Off-Line, Analysis Techniques to PCM Monitor Results to Aid the Efficient and Cost Effective Repackaging of Legacy PCM Wastes Containing Calcium and Potentially Plutonium Fluoride." In ASME 2009 12th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2009. http://dx.doi.org/10.1115/icem2009-16034.

Повний текст джерела
Анотація:
There are a small number of legacy, orphan waste, PCM (Plutonium Contaminated Material) drums at Sellafield Site containing calcium metal potentially contaminated by plutonium (Pu), some of which may be in the form of plutonium fluoride (PuF4). These drums were measured on a TRU-D® PCM Drum Monitor to give a Nuclear Safety value for the Pu mass based on Neutron Coincidence Counting (NCC) and the Pu isotopic composition measured for each drum using a germanium detector based High Resolution Gamma Spectrometry system. In some circumstances the presence of Pu in the form of PuF4 can cause a significant overestimate of the measured Pu mass. This is as a result of alphas emitted by the spontaneous decay of Pu isotopes interacting with light elements such as fluorine, resulting in the emission of “random” (alpha, n) neutrons. The potential overestimate may be very large for total neutron counting based systems if the presence of PuF4 is not accounted for in the system calibration. However, significant quantities of PuF4 may also result in overestimates for NCC systems due to potentially large statistical uncertainties in the measurement results caused by accidental coincidences involving the random (alpha, n) neutrons. Therefore in some circumstances, less pessimistic measurements may be obtained from the total neutron count, corrected using the measured “PuF4 ratio”. Standard TRU-D® Drum Monitor measurements of the calcium containing drums were carried out by plant operators. Relevant data was then downloaded from the plant instrument allowing additional off-line techniques to be applied to the high resolution gamma spectra associated with each drum. These spectra are routinely generated as part of the standard TRU-D® PCM Drum Monitor measurement. This analysis was based on the patented PuF4 analysis technique developed by VT Nuclear Services personnel to determine the mass ratio of Pu in the form of PuF4 to total Pu mass using the PuF4 reaction gammas and standard Pu gammas observed in the gamma spectrum. This additional, off-line analysis reduces the potential overestimate in the Pu Nuclear Safety Mass associated with each drum aiding the repackaging of the legacy material into Bull Pit cans. Following this, similar measurements and off-line analysis was carried out for the filled Bull Pit cans using a TRU-D® PCM Piece Monitor set up and commissioned specifically for this task. The further analysis results allowed the Bull Pit cans to be efficiently and cost effectively packed in 200 litre drums. The resulting new 200 litre drums were then measured using a standard, routinely operated TRU-D® PCM Drum Monitor for final sentencing (again taking into account off-line PuF4 analysis) to allow safe and secure storage. This paper describes the work carried out and the additional off-line PuF4 analysis techniques and how they have been applied within the exacting demands of Nuclear Safety in support of legacy material treatment and ultimate safe storage.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії