1 |
Java Decompilerm, http://java.decompiler.free.fr
|
2 |
undx, http://undx.sourceforge.net
|
3 |
Symantec, http://www.symantec.com/connect/blogs/androidostapsnake-watching-your-every-move
|
4 |
IDA Pro, http://hex-rays.com/idapro
|
5 |
보안뉴스, http://www.boannews.com/media/view.asp?idx=20547&kind=1
|
6 |
Lookout, http://blog.mylookout.com/2010/07/mobile-application-analysis-blackhat/
|
7 |
T. Blasing, L. Batyuk and A.D. Schmidt, "An Android Application Sandbox System for Suspicious Software Detection," Malicious and Unwanted Software (MALWARE), Oct 2010.
|
8 |
A. Shabtai, Y. Fledel, and Y. Elovici. Securing androidpowered mobile devices using selinux. IEEE Security and Privacy, 99(PrePrints), 2009.
|
9 |
smali, http://code.google.com/p/smali
|
10 |
dedexer, http://dedexer.sourceforge.net
|
11 |
Jreverse Pro, http://jreversepro.blogspot.com
|
12 |
JarAnalyzer, http://www.kirkk.com/main/Main/JarAnalyzer
|