Repackaged Smartphone Applications: Threats and Defenses.

dc.contributor.advisorXuxian Jiang, Co-Chairen_US
dc.contributor.advisorPeng Ning, Co-Chairen_US
dc.contributor.advisorWilliam Enck, Memberen_US
dc.contributor.advisorTing Yu, Memberen_US
dc.contributor.authorZhou, Wuen_US
dc.date.accepted2013-12-03en_US
dc.date.accessioned2013-12-06T10:30:14Z
dc.date.available2013-12-06T10:30:14Z
dc.date.defense2013-11-04en_US
dc.date.issued2013-11-04en_US
dc.date.released2013-12-06en_US
dc.date.reviewed2013-11-11en_US
dc.date.submitted2013-11-06en_US
dc.degree.disciplineComputer Scienceen_US
dc.degree.leveldissertationen_US
dc.degree.nameDoctor of Philosophyen_US
dc.identifier.otherdeg3078en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/9154
dc.rightsen_US
dc.titleRepackaged Smartphone Applications: Threats and Defenses.en_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
1.35 MB
Format:
Adobe Portable Document Format

Collections