최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.28 no.5, 2018년, pp.1209 - 1223
Android apps are made up of bytecode, so they are vulnerable to reverse engineering, and protection services are emerging that robustly repackage the app to compensate. Unlike cryptographic algorithms, the robustness of these protection services depends heavily on hiding the protection scheme. There...
Yishay Yovel. (2014). 4 Essential Ways to Protect My Mobile. Available: https://securityintelligence.com/how-to-protect-mobile-apps-essentials
Bangcle, "https://www.bangcle.com", 1. Oct. 2018.
Baidu, "http://apkprotect.baidu.com", 1. Oct. 2018.
360, "http://jiagu.360.cn", 1. Oct. 2018.
Ali, "http://jaq.alibaba.com", 1. Oct. 2018.
Tencent, "http://jiagu.qcloud.com", 1. Oct. 2018.
Ijiami, "http://www.ijiami.cn", 1. Oct. 2018.
Architectural Principles That Prevent Code Modification or Reverse Engineering, "https://www.owasp.org/index.php/Architectural_Principles_That_Prevent_Code_Modification_or_Reverse_Engineering", 10. Oct. 2018.
J. Kim and K. Lee, "Robust Anti Reverse Engineering Technique for Protecting Android Applications using the AES Algorithm," Journal of KIISE, 42 (9), pp. 1100-1108, Sept. 2015.
T. Strazzere and J. Sawyer, "Android Hacker Protection Level 0," presented at DEF CON 22, Aug. 2014.
S. Makkaveev and A. Bashan, "Unboxing Android: Everything you wanted to know about Android packers," presented at DEF CON 25, Aug. 2017.
Y. Zhang, X. Luo, and H. Yin, "The Terminator to Android Hardening Services," presented at HITCON 11, Aug. 2015.
Dalvik bytecode, "https://source.android.com/devices/tech/dalvik/dalvik-bytecode", 10. Oct. 2018.
APKTOOL, "https://ibotpeaches.github.io/Apktool", 10. Oct. 2018.
DEX2JAR, "https://github.com/pxb1988/dex2jar", 10. Oct. 2018.
JD-GUI, "http://jd.benow.ca", 10. Oct. 2018.
C. Linn and S. Debray, "Obfuscation of executable code to improve resistance to static disassembly," Proceedings of the 10th ACM conference on Computer and communications security, pp. 290-299, Oct. 2003.
I. V. Popov, S. K. Debray, and G. R. Andrews. "Binary Obfuscation Using Signals," USENIX Security Symposium, pp. 275-290, Aug. 2007.
R. Carbone, C. Bean, and M. Salois, " An In-depth Analysis of the Cold Boot Attack: Can it be Used for Sound For ensic Memory Acquisition?," Valcartier: Defence Research and Development Canada, Jan. 2011.
V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, and C. Giuffrida, "Drammer: Deterministic rowhammer attacks on mobile platforms," Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1675-1689, Oct. 2016.
C. Collberg, C. Thomborson, and D. Low, "Manufacturing cheap, resilient, and stealthy opaque constructs," In Proc. 25th. ACM Symposium on Principles of Programming Languages, pp. 184-196, Jan. 1998.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.