Sign in
Taming transitive permission attack via bytecode rewriting on Android application.
Daibin Wang
Hai Jin
Deqing Zou
Peng Xu
Tianqing Zhu
Gang Chen
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
android application
byte code
java card
countermeasures
smart card
fully functional
virtual machine
secret key
java virtual machine
hardware and software
third party
source code
android platform
information security
database systems
static analysis
open source
object oriented