Login / Signup
Explaining the Use of Cryptographic API in Android Malware.
Adam Janovsky
Davide Maiorca
Dominik Macko
Vashek Matyas
Giorgio Giacinto
Published in:
ICSBT/SECRYPT (Revised Selected Papers) (2022)
Keyphrases
</>
malware detection
application programming interface
api calls
smart card
anomaly detection
detect malicious
key management
anti virus
security protocols
generating explanations
hash functions
cryptographic protocols
security properties
secure communication