Login / Signup
Source Attribution of Cryptographic API Misuse in Android Applications.
Ildar Muslukhov
Yazan Boshmaf
Konstantin Beznosov
Published in:
AsiaCCS (2018)
Keyphrases
</>
smart card
source code
anomaly detection
third party
open source
real time
databases
neural network
database systems
countermeasures
application developers
key management
security protocols
random number generator