Now showing items 1-2 of 2
Detecting Repackaged Android Applications Using Perceptual Hashing
(Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
The last decade has shown a steady rate of Android device dominance in market share and the emergence of hundreds of thousands of apps available to the public. Because of the ease of reverse engineering Android applications, ...
Exploitation and Detection of a Malicious Mobile Application
(Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
Mobile devices are increasingly being embraced by both organizations and individuals in today’s society. Specifically, Android devices have been the prominent mobile device OS for several years. This continued amalgamation ...