Supported in part by the National Natural Science Foundation of China(61272493);the Specialized Research Fund for the Doctoral Program of Higher Education of China(20113402120026);Oversea Academic Training Funds of University of Science and Technology of China
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef...
supported in part by the Fundamental Research Funds for the Central Universities of China (Grant No.WK0110000007);the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No.20113402120026);the Natural Science Foundation of Anhui Province,China (Grant No. 1208085QF112);the Foundation for Young Talents in College of Anhui Province,China (GrantNo.2012SQRL001ZD);the Research Fund of ZTE Corpo ration
I IntroductionSmartphones have become more complex in terms of functions and third-party applications, and this makes lhem a living space for malware. People store private information such as accounts and passwordson ...