Login / Signup
Tackling runtime-based obfuscation in Android with TIRO.
Michelle Y. Wong
David Lie
Published in:
USENIX Security Symposium (2018)
Keyphrases
</>
malware detection
mobile devices
reverse engineering
mobile applications
anomaly detection
control flow
machine learning
static analysis
genetic algorithm
web services
bayesian networks
data structure
relational databases
database
smart phones
mobile platform
real world