Login / Signup
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Mariem Graa
Nora Cuppens-Boulahia
Frédéric Cuppens
Ana R. Cavalli
Published in:
SERE (Companion) (2014)
Keyphrases
</>
control strategy
expert systems
management system
static analysis
network intrusion detection systems
cyber attacks
control flow
human operators
countermeasures
reverse engineering
intelligent systems
control strategies
mobile phone
source code
open source
mobile devices
legacy systems
neural network