Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques

S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed System Security Symposium (NDSS), 2016.

Download
No fulltext has been uploaded.
Conference Paper | English
Author
Rasthofer, Siegfried; Arzt, Steven; Miltenberger, Marc; Bodden, EricLibreCat
Keywords
Publishing Year
Proceedings Title
Network and Distributed System Security Symposium (NDSS)
LibreCat-ID

Cite this

Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In: Network and Distributed System Security Symposium (NDSS). ; 2016.
Rasthofer, S., Arzt, S., Miltenberger, M., & Bodden, E. (2016). Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. Network and Distributed System Security Symposium (NDSS).
@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques}, booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016} }
Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” In Network and Distributed System Security Symposium (NDSS), 2016.
S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.
Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” Network and Distributed System Security Symposium (NDSS), 2016.

Link(s) to Main File(s)
Access Level
Restricted Closed Access

Export

Marked Publications

Open Data LibreCat

Search this title in

Google Scholar