Login / Signup

On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.

Xiaoxiao TangYu LiangXinjie MaYan LinDebin Gao
Published in: ICISC (2016)
Keyphrases
  • android application
  • reverse engineering
  • database
  • relational databases
  • source code
  • database design
  • hardware and software
  • fully functional