[1] 李霞. Android虚拟机运行时技术的分析与评测[D]. 南京:东南大学, 2015.(LI X. Analysis and evaluation of runtime technology of Android virtual machine[D]. Nanjing:Southeast University, 2015.) [2] ABSAR J, SHEKHAR D. Eliminating partially-redundant array-bounds check in the Android Dalvik JIT compiler[C]//Proceedings of the 9th International Conference on Principles and Practice of Programming in Java. New York:ACM, 2011:121-128. [3] 张洪睿, 张亚腾. 一种ART模式下应用加固方案[J]. 软件, 2015, 36(12):176-179.(ZHANG H R,ZHANG Y T. Application of packing scheme in ART mode[J]. Software, 2015, 36(12):176-179.) [4] LIAO Y, LI J, LI B, et al. Automated detection and classification for packed Android applications[C]//Proceedings of the 2016 IEEE International Conference on Mobile Services. Piscataway, NJ:IEEE, 2016:200-203. [5] FEREIDOONI H, CONTI M, YAO D, et al. ANASTASIA:ANdroid mAlware detection using STatic analySIs of Applications[C]//Proceedings of the 20168th IFIP International Conference on New Technologies, Mobility and Security. Piscataway, NJ:IEEE, 2016:1-5. [6] RASTOGI V, CHEN Y, JIANG X. DroidChameleon:evaluating Android anti-malware against transformation attacks[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information, computer and Communications Security. New York:ACM, 2013:329-334. [7] 朱洪军, 陈耀光, 华保健,等. 一种Android应用加固方案[J]. 计算机应用与软件, 2016, 33(11):297-300.(ZHU H J,CHEN Y G,HUA B J,et al. An Android application packing scheme[J]. Journal of Computer Applications and Software, 2016, 33(11):297-300.) [8] 邱寅峰, 泮晓波. APK文件的快速加载方法:CN201510657289.9[P]. 2015-10-12.(QIU Y F,PAN X B. Fast loading method for APK files:CN201510657289.9[P]. 2015-10-12.) [9] YU R. Android packers:facing the challenges, building solutions[EB/OL].[2016-11-20]. https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Yu.pdf. [10] KANG M G, POOSANKAM P, YIN H. Renovo:a hidden code extractor for packed executables[C]//Proceedings of the 2007 ACM Workshop on Recurring Malcode. New York:ACM, 2007:46-53. [11] LI J, ZHANG Y, YANG W, et al. DIAS:Automated online analysis for Android applications[C]//Proceedings of the 2014 IEEE International Conference on Computer and Information Technology. Washington, DC:IEEE Computer Society, 2014:307-314. [12] STRAZZERE T. Android-unpacker[EB/OL].[2016-11-20].https://github.com/strazzere/androidunpacker. [13] 高琦, 刘克胜, 常超,等. 基于自修改字节码的Android软件保护技术研究[J]. 计算机应用与软件, 2016, 33(4):230-234.(GAO Q, LIU K S, CHANG C, et al. Research on Android software protection technology based on self-modified bytecode[J]. Journal of Computer Applications and Software, 2016, 33(4):230-234.) [14] CHO H, LIM J, KIM H, et al. Anti-debugging scheme for protecting mobile apps on Android platform[J]. Journal of Supercomputing, 2016, 72(1):1-15. [15] YANG W, ZHANG Y, LI J, et al. AppSpear:bytecode decrypting and DEX reassembling for packed Android malware[C]//Proceedings of the 18th International Symposium Research in Attacks, Intrusions, and Defenses. Berlin:Springer, 2015:359-381. [16] ZHANG Y, LUO X, YIN H. DexHunter:toward extracting hidden code from packed Android applications[C]//Proceedings of the 20th European Symposium on Research in Computer Security. Berlin:Springer, 2015:293-311. |