• Publications
  • Influence
CodeMatch: obfuscation won't conceal your repackaged app
An established way to steal the income of app developers, or to trick users into installing malware, is the creation of repackaged apps. These are clones of - typically - successful apps. To concealExpand
  • 24
  • 3
  • PDF
Hidden truths in dead software paths
Approaches and techniques for statically finding a multitude of issues in source code have been developed in the past. A core property of these approaches is that they are usually targeted towardsExpand
  • 10
  • PDF
A vulnerability's lifetime: enhancing version information in CVE databases
The National Vulnerability Database (NVD) is a rich source of information for system administrators, software engineers, IT security consultants, and researchers in software security. RelevantExpand
  • 8
Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy
String obfuscation is an established technique used by proprietary, closed-source applications to protect intellectual property. Furthermore, it is also frequently used to hide spyware or malware inExpand
  • 1
  • PDF