Login / Signup
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.
Xiaoxiao Tang
Yu Liang
Xinjie Ma
Yan Lin
Debin Gao
Published in:
ICISC (2016)
Keyphrases
</>
android application
reverse engineering
database
relational databases
source code
database design
hardware and software
fully functional