![Smartphones / Embedded Linux / Formal languages / Malware / Model theory / Dalvik / Pointer analysis / Data-flow analysis / String / Computing / Software / Android Smartphones / Embedded Linux / Formal languages / Malware / Model theory / Dalvik / Pointer analysis / Data-flow analysis / String / Computing / Software / Android](https://www.pdfsearch.io/img/cd148333310bc11959a9f834f1f6f11e.jpg)
| Document Date: 2014-03-23 14:11:52 Open Document File Size: 396,86 KBShare Result on Facebook
City New York / Berlin / London / / Company IBM / UIs / Analyzer Time / Google / CONCUR / Cox L. P. / DARPA / / Country Germany / United States / United Kingdom / / Currency USD / / / Facility Petey Aldous University of Utah / / IndustryTerm to other applications / malware analysis tools / communications security / anti-diffing tool / pushdown reachability algorithm / web application / Internet permissions / static analysis tool / possible applications / finite-state-based static analysis tools / web view / malicious applications / smart phone operating systems / pushdown systems / reachability algorithms / search analysis results / web view activity / web component / malicious site / apk tool / software architecture / / OperatingSystem Linux / Android / DoS / / Organization Northeastern University / U.S. Government / pp. / U.S. Securities and Exchange Commission / USENIX Association / University of Utah / / Person David Van Horn / Steven Lyde / Matthew Might / Andrew W. Keep / Thomas Gilray / / Position task manager / interpreter / author / same analyst / analyst / human analyst / analytic model for object-oriented programs / Operational semantics General / / ProgrammingLanguage Java / XML / / ProvinceOrState Manitoba / / Technology Functional Programming / XML / SMS / smart phone / Linux / API / GPS / mobile phones / Android / operating system / operating systems / reachability algorithms / pushdown reachability algorithm / java / smartphones / HTTP / / URL http /
SocialTag |