Login / Signup

Source Attribution of Cryptographic API Misuse in Android Applications.

Ildar MuslukhovYazan BoshmafKonstantin Beznosov
Published in: AsiaCCS (2018)
Keyphrases
  • smart card
  • source code
  • anomaly detection
  • third party
  • open source
  • real time
  • databases
  • neural network
  • database systems
  • countermeasures
  • application developers
  • key management
  • security protocols
  • random number generator