1 |
Maria Garnaeva, Fedor Sinitsyn, Yury Namestnikov, Denis Makrushin and Alexander Liskin, "Kaspersky Security Bulletin:OVERALL STATISTIVS FOR 2016," Kaspersky Lab, Dec. 2016
|
2 |
Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh and Lorenzo Cavallaro, "The Evolution of Android Malware and Android Analysis Techniques," ACM Computing Surveys (CSUR), vol. 49, no. 4, pp. 1-41, Feb. 2017
|
3 |
Se Young Lee, Jin Hyung Park, Moon Chan Park, Jae Hyuk Suk, Dong Hoon Lee, "A Study on Deobfuscation Method of Android and Implementation of Automatic Analysis Tool," Jonornal of The Korea Institute of information Security & Cryptology, 25(5), pp. 1201-1215, Oct. 2015
DOI
|
4 |
Yeongung Park, "We Can Still Crack You! General Unpacking Method for Android Packer (no root)," DEFCON, Mar. 2015
|
5 |
"Android KitKat unveiled in Google surprise move," BBC, 3 Sep, 2013
|
6 |
Anwar Ghuloum, Brian Carlstrom and Ian Rogers, "ART: ANdroid's Runtime Evolved," Google I/O 2014, Jun. 2014
|
7 |
J.Kim and E. Lee, "A strategy of effectively applying a control flow obfuscation to programes," J. Korea Soc. Comput. Inf., vol 16, no. 6, pp. 41-50 Jun. 2011
DOI
|
8 |
Y. Piao, J. Jung, and J.H. Yi, "structural and Functional Analyses of ProGuard Obfuscation Tool," J. KICS, vol. 38, no. 8, pp. 654-662, Aug. 2013
|
9 |
AppSuit, http://premium.appsu.it
|
10 |
Kim. Hee Moon, "Protection Framework for Android Application by Encrypting DEX files," The Graduate School of Hanyang University, Feb. 2011
|
11 |
https://play.google.com/intl/ko_ALL/about/index.html
|
12 |
JungHyun Kim, Kang Seung Lee, "Robust Anti Reverse Engineering Technique for Protecting Android Applications using the AES Algorithm," Journal of KIISE, Vol.42, No. 9, pp. 1100-1108, Sep. 2015
DOI
|
13 |
Privacy Statement, http://inside.olle h.com/html/infoView.asp
|
14 |
https://developer.android.com/reference/dalvik/system/DexClassLoader.html
|
15 |
https://gadgetstouse.com/gadget-tech/sd-card-explained/32377
|