Title: |
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices |
Article URLs: |
|
Alternative Article URLs: |
|
Authors: |
Wei You |
-
(Renmin University of China) Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
Bin Liang |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
Wenchang Shi |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
Shuyang Zhu |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
Peng Wang |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
Sikefu Xie |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
Xiangyu Zhang |
-
Purdue University, Department of Computer Science
|
Sharing: |
Unknown
|
Verification: |
Authors have
not verified
information
|
Artifact Evaluation Badge: |
none
|
Artifact URLs: |
|
Artifact Correspondence Email Addresses: |
|
NSF Award Numbers: |
1409668,
1320326,
0845870
|
DBLP Key: |
conf/icse/YouLSZWXZ16
|
Author Comments: |
|