{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:04:15Z","timestamp":1726002255895},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_8","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T15:52:06Z","timestamp":1544025126000},"page":"146-167","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Accuracy in Similarity Analysis of Android Applications"],"prefix":"10.1007","author":[{"given":"Sreesh","family":"Kishore","sequence":"first","affiliation":[]},{"given":"Renuka","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sreeranga","family":"Rajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"8_CR1","unstructured":"Androguard (2016). https:\/\/code.google.com\/p\/androguard\/"},{"key":"8_CR2","unstructured":"Android: Configure Apps With Over 64K Methods (2016). https:\/\/developer.android.com\/studio\/build\/multidex.html"},{"key":"8_CR3","doi-asserted-by":"crossref","first-page":"367","DOI":"10.4310\/CIS.2005.v5.n4.a1","volume":"5","author":"M Cebri\u00e1n","year":"2005","unstructured":"Cebri\u00e1n, M., Alfonseca, M., Ortega, A.: Common pitfalls using the normalized compression distance: what to watch out for in a compressor. Commun. Inf. Syst. 5, 367\u2013384 (2005)","journal-title":"Commun. Inf. Syst."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. In: ICSE (2014)","DOI":"10.1145\/2568225.2568286"},{"key":"8_CR5","unstructured":"Chen, K., et al.: Finding unknown malice in 10 seconds: massing vetting for new threats at Google-pay scale. USENIX (2015)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1016\/j.tcs.2009.02.023","volume":"410","author":"S Chen","year":"2009","unstructured":"Chen, S., Ma, B., Zhang, K.: On the similarity metric and the distance metric. Theor. Comput. Sci. 410, 2365\u20132376 (2009)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TIT.2004.830793","volume":"50","author":"X Chen","year":"2004","unstructured":"Chen, X., Francia, B., Li, M., McKinnon, B., Seker, A.: Shared information and program plagiarism detection. IEEE Trans. Inf. Theory 50, 1545\u20131551 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-33167-1_3","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J Crussell","year":"2012","unstructured":"Crussell, J., Gibler, C., Chen, H.: Attack of the clones: detecting cloned applications on Android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37\u201354. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33167-1_3"},{"key":"8_CR9","unstructured":"Desnos, A.: Android: static analysis using similarity distance. In: AusPDC (2010)"},{"key":"8_CR10","unstructured":"Desnos, A.: Measuring similarity of Android applications via reversing and k-gram birthmarking. In: AusPDC (2010)"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/TIFS.2017.2687880","volume":"12","author":"M Fan","year":"2017","unstructured":"Fan, M., Liu, J., Wang, W., Li, H., Tian, Z., Liu, T.: DAPASA: detecting Android piggybacked apps through sensitive subgraph analysis. IEEE Trans. Inf. Forensics Secur. 12, 1772\u20131785 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2015","unstructured":"Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 17, 998\u20131022 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"8_CR13","unstructured":"Faruki, P., Ganmoor, V., Laxmi, V., Gaur, M., Bharmal, A.: AndroSimilar: robust statistical feature signature for Android malware detection. In: AusPDC (2010)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-47560-8_9","volume-title":"Secure IT Systems","author":"O Gadyatskaya","year":"2016","unstructured":"Gadyatskaya, O., Lezza, A.-L., Zhauniarovich, Y.: Evaluation of resource-based app repackaging detection in Android. In: Brumley, B.B., R\u00f6ning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 135\u2013151. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47560-8_9"},{"key":"8_CR15","unstructured":"Gascon, H., Yamaguchi, F., Arp, D.: Structural detection of Android malware using embedded call graphs (2018)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-30806-7_6","volume-title":"Engineering Secure Software and Systems","author":"Q Guan","year":"2016","unstructured":"Guan, Q., Huang, H., Luo, W., Zhu, S.: Semantics-based repackaging detection for mobile apps. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 89\u2013105. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30806-7_6"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2016.05.021","volume":"65","author":"I Gurulian","year":"2016","unstructured":"Gurulian, I., Markantonakis, K., Cavallaro, L., Mayes, K.: You can\u2019t touch this: consumer-centric Android application repackaging detection. Future Gener. Comput. Syst. 65, 1\u20139 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S Hanna","year":"2013","unstructured":"Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: a scalable system for detecting code reuse among Android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 62\u201381. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37300-8_4"},{"key":"8_CR19","unstructured":"Haoshi, H.: Detecting repackaged Android apps using server-side analysis. Master\u2019s thesis, Eindhoven University of Technology (2016)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-38908-5_13","volume-title":"Trust and Trustworthy Computing","author":"H Huang","year":"2013","unstructured":"Huang, H., Zhu, S., Liu, P., Wu, D.: A framework for evaluating mobile app repackaging detection algorithms. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) Trust 2013. LNCS, vol. 7904, pp. 169\u2013186. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38908-5_13"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Ishii, Y., Watanabe, T., Akiyama, M., Mori, T.: Clone or relative?: understanding the origins of similar Android apps. In: IWSPA (2016)","DOI":"10.1145\/2875475.2875480"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Ishio, T., Sakaguchi, Y., Ito, K., Inoue, K.: Source file set search for clone-and-own reuse analysis. In: ICSE (2017)","DOI":"10.1109\/MSR.2017.19"},{"key":"8_CR23","first-page":"479174","volume":"11","author":"H Kang","year":"2015","unstructured":"Kang, H., Jang, J., Mohaisen, A., Kim, H.K.: Detecting and classifying Android malware using static analysis along with creator information. IJDSN 11, 479174 (2015)","journal-title":"IJDSN"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Kang, S., Shim, H., Cho, S., Park, M., Han, S.: A robust and efficient birthmark-based Android application filtering system. In: RACS (2014)","DOI":"10.1145\/2663761.2664231"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s10515-015-0182-6","volume":"23","author":"D Kim","year":"2016","unstructured":"Kim, D., Gokhale, A., Ganapathy, V., Srivastava, A.: Detecting plagiarized mobile apps using API birthmarks. Autom. Softw. Eng. 23, 591\u2013618 (2016)","journal-title":"Autom. Softw. Eng."},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","volume":"3","author":"JD Kornblum","year":"2006","unstructured":"Kornblum, J.D.: Identifying almost identical files using context triggered piece-wise hashing. Digit. Invest. 3, 91\u201397 (2006)","journal-title":"Digit. Invest."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Li, L., Bissyande, T.F., Klein, J., Traon, Y.L.: An investigation into the use of common libraries in Android apps. CoRR (2015)","DOI":"10.1109\/SANER.2016.52"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1007\/s11390-017-1786-z","volume":"32","author":"L Li","year":"2017","unstructured":"Li, L., et al.: On locating malicious code in piggybacked Android apps. J. Comput. Sci. Technol. 32, 1108\u20131124 (2017)","journal-title":"J. Comput. Sci. Technol."},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: Automatically locating malicious packages in piggybacked Android apps. In: MOBILESoft (2017)","DOI":"10.1109\/MOBILESoft.2017.6"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TIT.2004.838101","volume":"50","author":"M Li","year":"2004","unstructured":"Li, M., Chen, X., Li, X., Ma, B., Vit\u00e1nyi, P.M.B.: The similarity metric. IEEE Trans. Inf. Theory 50, 3250\u20133264 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"8_CR31","unstructured":"Lina, S., et al.: AppIS: protect Android apps against runtime repackaging attacks. In: ICPADS (2017)"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Linares-V\u00e1squez, M., Holtzhauer, A., Poshyvanyk, D.: On automatically detecting similar Android apps. In: IEEE ICPC (2016)","DOI":"10.1109\/ICPC.2016.7503721"},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/6958698","volume":"2017","author":"Fang Lyu","year":"2017","unstructured":"Lyu, F., Lin, Y., Yang, J.: An efficient and packing-resilient two-phase Android cloned application detection approach. Mob. Inf. Syst. 2017, 12 p. (2017). https:\/\/doi.org\/10.1155\/2017\/6958698 . Article ID 6958698","journal-title":"Mobile Information Systems"},{"key":"8_CR34","unstructured":"Pouik, G.: Phrack (2016). http:\/\/phrack.org\/issues\/68\/15.html#article"},{"key":"8_CR35","unstructured":"Salem, A.: Stimulation and detection of Android repackaged malware with active learning. arXiv (2018)"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Soh, C., Tan, H.B.K., Arnatovich, Y.L., Wang, L.: Detecting clones in Android applications through analyzing user interfaces. In: ICSE (2015)","DOI":"10.1109\/ICPC.2015.25"},{"key":"8_CR37","unstructured":"Sophos (2018). https:\/\/nakedsecurity.sophos.com\/2017\/08\/24\/malware-rains-on-googles-android-oreo-parade\/"},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/j.eswa.2013.07.106","volume":"41","author":"G Suarezl","year":"2014","unstructured":"Suarezl, G., Tapiador, J.E., Peris-Lopez, P., Blasco, J.: Dendroid: a text mining approach to analyzing and classifying code structures in Android malware families. Expert Syst. Appl. 41, 1104\u20131117 (2014)","journal-title":"Expert Syst. Appl."},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Sun, M., Li, M., Lui, J.C.S.: DroidEagle: seamless detection of visually similar Android apps. In: ACM WiSec (2015)","DOI":"10.1145\/2766498.2766508"},{"key":"8_CR40","unstructured":"Tamada, H.: (2016). http:\/\/stigmata.osdn.jp\/"},{"key":"8_CR41","doi-asserted-by":"publisher","first-page":"2148","DOI":"10.1093\/ietisy\/e88-d.9.2148","volume":"88","author":"H Tamada","year":"2005","unstructured":"Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.I.: Java birthmarks - detecting the software theft. IEICE Trans. 88, 2148\u20132158 (2005)","journal-title":"IEICE Trans."},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Thomas, D.R., Beresford, A.R., Rice, A.C.: Security metrics for the Android ecosystem. In: SPSMCCS. ACM (2015)","DOI":"10.1145\/2808117.2808118"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Tian, K., Yao, D., Ryder, B.G., Tan, G.: Analysis of code heterogeneity for high-precision classification of repackaged malware. In: SPW (2016)","DOI":"10.1109\/SPW.2016.33"},{"key":"8_CR44","unstructured":"Gayoso Mart\u00ednez, V., Hern\u00e1ndez \u00c1lvarez, F., Hern\u00e1ndez Encinas, L.: State of the art in similarity preserving hashing functions. SAM (2014)"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Wang, H., Guo, Y., Ma, Z., Chen, X.: WuKong: a scalable and accurate two-phase approach to Android app clone detection. In: ISSTA. ACM SIGSOFT (2015)","DOI":"10.1145\/2771783.2771795"},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Yue, S., et al.: RepDroid: an automated tool for Android application repackaging detection. In: ICPC (2017)","DOI":"10.1109\/ICPC.2017.16"},{"key":"8_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-662-43936-4_9","volume-title":"Data and Applications Security and Privacy XXVIII","author":"Y Zhauniarovich","year":"2014","unstructured":"Zhauniarovich, Y., Gadyatskaya, O., Crispo, B., La Spina, F., Moser, E.: FSquaDRA: fast detection of repackaged applications. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 130\u2013145. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43936-4_9"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of \u201cpiggybacked\u201d mobile applications. In: CODASPY. ACM (2013)","DOI":"10.1145\/2435349.2435377"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party Android marketplaces. In: CODASPY. ACM (2013)","DOI":"10.1145\/2133601.2133640"},{"key":"8_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting Android malware: characterization and evolution. In: IEEE Symposium on S&P. IEEE (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T17:43:54Z","timestamp":1662572634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}