1 |
R Mohsen and AM Pinto. "Evaluating obfuscation security: A quantitative approach," Springer, vol. 9482, May. 2015.
|
2 |
Roedy green. "How To Write Unmaintainable code," Java Developers' Journal, Jan. 2000.
|
3 |
"Final Report on Information Security Survey" pp. 59-63. KISA, Feb. 2020.
|
4 |
Parvez Faruki, Hossein Fereidooni, Vijay Laxmi, Mauro Conti, Manoj Gaur. "Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions," arXiv: 1611.10231, Nov. 2016.
|
5 |
Atanas Rountev, Yan Wang. "Who Changed You? Obfuscator Identification for Android," IEEE, pp. 154-164, July. 2017.
|
6 |
J. E. Tapiador, L. Gonz'ales-Manzano, O. Mirzaei, J. M. de Fuentes. AndrODet: An adaptive Android obfuscation detector. Elsevier, pp. 222-235, July. 2018.
|
7 |
Nahid Shahmehri, Alireza Mohammadinodooshan, Ulf Karg'en. Comment on "AndrODet: An adaptive Android obfuscation detector". Future Generation Computer Systems, pp. 240-261, vol 90, Jan. 2020.
DOI
|
8 |
Nahid Shahmehri, Alireza Mohammadinodooshan, Ulf Kargen. "Robust Detection of Obfuscated Strings in Android Apps," AISec'19, pp. 25-35, Nov. 2019.
|
9 |
Sun Microsystems. "Java Code Conventions", pp.15-16. Oracle, Sep. 1997.
|
10 |
Github, "open-source-android-apps," https://github.com/pcqpcq/open-sourceandroid-apps, May. 2020
|
11 |
Github, "dex2jar," https://github.com/pxb1988/dex2jar, Jun. 2015.
|
12 |
S Hochreiter and J Schmidhuber, "Long short-term memory," Neural computation, pp. 1735-1780, Feb. 1997.
|
13 |
Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl, Dominik Wermke, Nicolas Huaman. "A Large Scale Investigation of Obfuscation Use in Google Play," ACSAC, Dec. 2018.
|
14 |
Hyoung-Kee Choi, Dongmin Jo. "Android Application Obfuscation Technique Inducing Misjudgement of Obfuscation Application," Korea Institute Of Communication Sciences, 38(8), pp. 654-662, Jan. 2018.
|