Cited By
View all- Ho J(2025)Game Theoretic Approach Toward Detection of Input‐Driven Evasive Malware in the IoTSecurity and Privacy10.1002/spy2.4678:1Online publication date: 12-Jan-2025
- Dong ZLiu TDeng JWang HLi LYang MWang MXu GXu GBalzarotti DXu W(2024)Exploring covert third-party identifiers through external storage in the android new eraProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699154(4535-4552)Online publication date: 14-Aug-2024
- Ruggia ANisi DDambra SMerlo ABalzarotti DAonzo SQuek TGao DZhou JCardenas A(2024)Unmasking the Veiled: A Comprehensive Analysis of Android Evasive MalwareProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637658(383-398)Online publication date: 1-Jul-2024
- Show More Cited By