[1]
Android Open Source Project. Android sources. Visited: May, 2012. [Online]. Available: http: /source. android. com.
Google Scholar
[2]
Code Protection in Android , Patrick Schulz, June 7, 2012. https: /net. cs. uni-bonn. de/fileadmin/user_upload/plohmann/2012-Schulz-Code_Protection_in_Android. pdf.
Google Scholar
[3]
Manjunath, Vibha. Reverse Engineering of Malware on Android", 2011, http: /docs. google. com/views, a=v&q=cache: rm7krxkeygsJ: www. sans. org/reading_room/whitepapers/pda/reverse-engineering-malware-android 33769+research].
Google Scholar
[4]
C. A. Castillo and Mobile Security Working Group McAfee, \Android malware past, present, and future, " (2011).
Google Scholar
[5]
Joonhyouk Jang, Cheol Jeon Jinman Jung Bongjae Kim Jiyeon Park Yookun Cho Robust Static Software Watermarking Scheme for Copyright Protection of Mobile Software. School of Computer Science and Engineering, Seoul National University.
DOI: 10.1049/cp.2013.2196
Google Scholar
[6]
Sung Ryul Kim, Jun Ho Noh, Yang Chan Moon, AH Ryum Kim, Design and Implementation of Cryptography-based Copy Protection System for Android Apps, Dept. Internet Media Engineering, Konkuk University.
Google Scholar
[7]
Eungyu Lee, Yeongung Park, Kanghee Kim, Seongje Cho, A Mobile Application Anti-Piracy Technique Using Mandatory Access Control, School of Electronic Engineering, Soongsil University, Dept. Computer Science, Dankook University.
Google Scholar
[8]
Yoon-sik Jeong, Jea-Chan Moon, Dong-Jin Kim, Seong-Je Cho, Minku Park, Preventing Illegal Execution of android App based on Encryption under Mobile Network Environment, Dept. Computer Science, Dankook University, Dept. Computer Engineering, Konkuk University.
Google Scholar
[9]
Sung Ryul Kim, Ji Hyun Kim, Hee Sun Kim, A Hybrid Design of Online Execution Class and Encryption-based Copyright Protection for Android Apps. Dept. Internet-Media Engineering, Konkuk University.
DOI: 10.1145/2401603.2401678
Google Scholar
[10]
Android, A. P. K. http: /developer. android. com/guide/market/expansion-files. html.
Google Scholar
[11]
Miecznikowski, J., & Hendren, L. (2002). Decompiling java bytecode: Problems, traps and pitfalls. In: R. Nigel Horspool (Ed. ), Compiler construction, (p.153–184). Berlin: Springer.
DOI: 10.1007/3-540-45937-5_10
Google Scholar
[12]
An Assembler(smali) and disassembler(baksmali) for androids dex format. http: /code. google. com/p/smali.
Google Scholar
[13]
Brutall. http: /code. google. com/p/android-apktool.
Google Scholar
[14]
Panxiaobo. http: /code. google. com/p/dex2jar.
Google Scholar
[15]
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1–6, (2010).
DOI: 10.1145/2619091
Google Scholar
[16]
Emmanuel Dupuy. http: /java. decompiler. free. fr/?q=jdgui.
Google Scholar