Login / Signup

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.

Chao YangGuangliang YangAshish GehaniVinod YegneswaranDawood TariqGuofei Gu
Published in: SecureComm (2015)
Keyphrases