| Title: |
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices |
| Article URLs: |
|
| Alternative Article URLs: |
|
| Authors: |
Wei You |
-
(Renmin University of China) Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
| Bin Liang |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
| Wenchang Shi |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
| Shuyang Zhu |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
| Peng Wang |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
| Sikefu Xie |
-
Renmin University of China, Beijing, China, Key Laboratory of Data Engineering and Knowledge Engineering
-
Renmin University of China, Beijing, China, School of Information
|
| Xiangyu Zhang |
-
Purdue University, Department of Computer Science
|
| Sharing: |
Unknown
|
| Verification: |
Authors have
not verified
information
|
| Artifact Evaluation Badge: |
none
|
| Artifact URLs: |
|
| Artifact Correspondence Email Addresses: |
|
| NSF Award Numbers: |
1409668,
1320326,
0845870
|
| DBLP Key: |
conf/icse/YouLSZWXZ16
|
| Author Comments: |
|