|
[1] Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud. Performance evaluation of symmetric encryption algorithms. In IJCSNS International Journal of Computer Science and Network Security, 2008. [2] Android activity execute analysis. http://blog.csdn.net/luoshengyang/ article/details/6689748. [3] Dex file structure. http://www.ahnlab.co.jp/securityinfo/blog.asp?seq= 199. [4] Number of android applications. http://www.appbrain.com/stats/ number-of-android-apps. [5] Pirate bay android apps removed from google play. http://technews.tw/ 2014/12/08/google-removes-pirate-bay-apps/. [6] The greatest threats to the android ecosystem. http://betanews.com/2014/ 07/22/the-greatest-threats-to-the-android-ecosystem/. [7] Bytecode for the dalvik vm. http://source.android.com/devices/tech/ dalvik/dalvik-bytecode.html. [8] .dex dalvik executable format. http://source.android.com/devices/tech/ dalvik/dex-format.html. [9] App manifest. http://developer.android.com/guide/topics/manifest/ manifest-intro.html. 38 [10] Android ndk. https://developer.android.com/tools/sdk/ndk/index. html. [11] Google lvl home page. http://developer.android.com/google/play/ licensing/licensing-reference.html. [12] Xudong Wu and Xin Li. Hack android application and defence. In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT), 2013. [13] Youn-Sik Jeong, Yeong-Ung Park, Jae-Chan Moon, Seong-Je Cho, and Minkyu Park Dongjin Kim. An anti-piracy mechanism based on class separation and dynamic loading for android applications. In RACS ’12 Proceedings of the 2012 ACM Research in Applied Computation Symposium, pages 328–332, 2012. [14] Kuo-Yu Tsai, Yu-Hsuan Chiu, and Tzong-Chen Wu. Android app copy protection mechanism based on dynamic loading. In The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014), 2014. [15] Yun kyung Lee, Jae deok Lim, Yong-Sung Jeon, and Jeong nyeo Kim. Protection method from app repackaging attack on mobile device with separated domain. In 2014 International Conference on Information and Communication Technology Convergence (ICTC), 2014. [16] F.i.p. standard, advanced encryption standard (aes), national institute of standards and technology (nist), 2001. [17] Howard Cheng and Xiaobo Li. Partial encryption of compressed images and videos. In IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 8, AUGUST 2000, 2000. [18] Apktool-a tool for reverse engineering android apk files. http://tpeaches. github.iboio/Apktool/. 39 [19] smali-an assembler/disassembler for android’s dex format. https://code. google.com/p/smali/. [20] Aamer Nadeem. A performance comparison of data encryption algorithms. In Information and Communication Technologies, 2005. ICICT 2005., 2005. [21] Openssl. https://www.openssl.org/. [22] Android reference. http://developer.android.com/reference/packages. html. [23] Android source code. https://android.googlesource.com/platform/ dalvik/+/android-4.4.4_r2.0.1/vm/native/dalvik_system_DexFile. cpp. [24] Android signature. http://developer.android.com/tools/publishing/ app-signing.html. |