Login / Signup
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Shuaike Dong
Menghao Li
Wenrui Diao
Xiangyu Liu
Jian Liu
Zhou Li
Fenghao Xu
Kai Chen
Xiaofeng Wang
Kehuan Zhang
Published in:
SecureComm (1) (2018)
Keyphrases
</>
malware detection
mobile devices
real life
small scale
decision making
web scale
database
real time
data sets
real world
information retrieval
learning environment
relational databases
mobile phone
user experience
reverse engineering