
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy
Leonid Glanz, Patrick Müller, Lars Baumgärtner, et al.
(2020), pp. 694-707
Open Access | Times Cited: 20
Leonid Glanz, Patrick Müller, Lars Baumgärtner, et al.
(2020), pp. 694-707
Open Access | Times Cited: 20
Showing 20 citing articles:
A survey of android application and malware hardening
Vikas Sihag, Manu Vardhan, Pradeep Kumar Singh
Computer Science Review (2021) Vol. 39, pp. 100365-100365
Closed Access | Times Cited: 61
Vikas Sihag, Manu Vardhan, Pradeep Kumar Singh
Computer Science Review (2021) Vol. 39, pp. 100365-100365
Closed Access | Times Cited: 61
Use of cryptography in malware obfuscation
Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 1, pp. 135-152
Closed Access | Times Cited: 9
Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 1, pp. 135-152
Closed Access | Times Cited: 9
Precisely Extracting Complex Variable Values from Android Apps
Marc Miltenberger, Steven Arzt
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 5, pp. 1-56
Open Access | Times Cited: 2
Marc Miltenberger, Steven Arzt
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 5, pp. 1-56
Open Access | Times Cited: 2
Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification
Francisco Handrick da Costa, Ismael Medeiros, Thales Menezes, et al.
Journal of Systems and Software (2021) Vol. 183, pp. 111092-111092
Open Access | Times Cited: 15
Francisco Handrick da Costa, Ismael Medeiros, Thales Menezes, et al.
Journal of Systems and Software (2021) Vol. 183, pp. 111092-111092
Open Access | Times Cited: 15
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns, Constantin Sander, R Decker, et al.
(2023)
Open Access | Times Cited: 6
Markus Dahlmanns, Constantin Sander, R Decker, et al.
(2023)
Open Access | Times Cited: 6
Programming Languages and Systems
Lecture notes in computer science (2024)
Closed Access | Times Cited: 1
Lecture notes in computer science (2024)
Closed Access | Times Cited: 1
A Modular Soundness Theory for the Blackboard Analysis Architecture
Sven Keidel, Dominik Helm, Tobias Roth, et al.
Lecture notes in computer science (2024), pp. 361-390
Open Access | Times Cited: 1
Sven Keidel, Dominik Helm, Tobias Roth, et al.
Lecture notes in computer science (2024), pp. 361-390
Open Access | Times Cited: 1
Demystifying Hidden Sensitive Operations in Android Apps
Xiaoyu Sun, Xiao Chen, Li Li, et al.
ACM Transactions on Software Engineering and Methodology (2022) Vol. 32, Iss. 2, pp. 1-30
Open Access | Times Cited: 6
Xiaoyu Sun, Xiao Chen, Li Li, et al.
ACM Transactions on Software Engineering and Methodology (2022) Vol. 32, Iss. 2, pp. 1-30
Open Access | Times Cited: 6
Enabling Collaborative Data Science Development with the Ballet Framework
Micah J. Smith, Jürgen Cito, Kelvin Lu, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-39
Open Access | Times Cited: 6
Micah J. Smith, Jürgen Cito, Kelvin Lu, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-39
Open Access | Times Cited: 6
Toward a Secure Platform for Brain-Connected Devices—Issues and Current Solutions
Scott C. Greenhorn
IEEE Transactions on Technology and Society (2020) Vol. 1, Iss. 3, pp. 161-172
Closed Access | Times Cited: 3
Scott C. Greenhorn
IEEE Transactions on Technology and Society (2020) Vol. 1, Iss. 3, pp. 161-172
Closed Access | Times Cited: 3
Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps
Ulf Kargén, Noah Mauthe, Nahid Shahmehri
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023)
Open Access | Times Cited: 1
Ulf Kargén, Noah Mauthe, Nahid Shahmehri
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023)
Open Access | Times Cited: 1
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation
Mandy Knöchel, Sebastian Karius
(2024) Vol. 3, pp. 113-124
Closed Access
Mandy Knöchel, Sebastian Karius
(2024) Vol. 3, pp. 113-124
Closed Access
ValBench: Benchmarking Exact Value Analysis
Marc Miltenberger, Steven Arzt
(2024), pp. 45-51
Open Access
Marc Miltenberger, Steven Arzt
(2024), pp. 45-51
Open Access
Proceedings of the 13th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis
(2024)
Open Access
(2024)
Open Access
ASTANA: Practical String Deobfuscation for Android Applications Using Program Slicing
Martijn de Vos, Johan Pouwelse
arXiv (Cornell University) (2021)
Open Access | Times Cited: 3
Martijn de Vos, Johan Pouwelse
arXiv (Cornell University) (2021)
Open Access | Times Cited: 3
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit
Guosheng Xu, Siyi Li, Hao Zhou, et al.
Proceedings of the ACM Web Conference 2022 (2022), pp. 3327-3335
Closed Access | Times Cited: 2
Guosheng Xu, Siyi Li, Hao Zhou, et al.
Proceedings of the ACM Web Conference 2022 (2022), pp. 3327-3335
Closed Access | Times Cited: 2
Collect Responsibly But Deliver Arbitrarily?
Shuai Li, Zhemin Yang, Nan Hua, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 1887-1900
Closed Access | Times Cited: 2
Shuai Li, Zhemin Yang, Nan Hua, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 1887-1900
Closed Access | Times Cited: 2
Exploring the Use of Static and Dynamic Analysis to Improve the Performance of the Mining Sandbox Approach for Android Malware Identification
Francisco Handrick da Costa, Ismael Medeiros, Thales Menezes, et al.
arXiv (Cornell University) (2021)
Closed Access
Francisco Handrick da Costa, Ismael Medeiros, Thales Menezes, et al.
arXiv (Cornell University) (2021)
Closed Access
Android apps call graph construction and obfuscation investigation
Abdelrahman M Baz
(2021)
Open Access
Abdelrahman M Baz
(2021)
Open Access