{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:42:07Z","timestamp":1742956927270,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030948214"},{"type":"electronic","value":"9783030948221"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94822-1_18","type":"book-chapter","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T13:03:04Z","timestamp":1644325384000},"page":"322-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SEMEO: A Semantic Equivalence Analysis Framework for\u00a0Obfuscated Android Applications"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Hu","sequence":"first","affiliation":[]},{"given":"Bruno Vieira Resende E.","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Bagheri","sequence":"additional","affiliation":[]},{"given":"Witawas","family":"Srisa-an","sequence":"additional","affiliation":[]},{"given":"Gregg","family":"Rothermel","sequence":"additional","affiliation":[]},{"given":"Jackson","family":"Dinh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"18_CR1","unstructured":"Ponomarenko, A.: A tool for checking backward API\/ABI compatibility of a Java library (2013). https:\/\/github.com\/lvc\/japi-compliance-checker"},{"key":"18_CR2","unstructured":"Android. Dalvik bytecode (2015). https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode.html"},{"key":"18_CR3","unstructured":"Fenton, C.: A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis (2015). https:\/\/github.com\/CalebFenton\/dex-oracle"},{"key":"18_CR4","unstructured":"Fenton, C.: Generic Android Deobfuscator (2015). https:\/\/github.com\/CalebFenton\/simplify"},{"key":"18_CR5","unstructured":"Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12, SSYM\u201903, Washington, DC, pp. 12 (2003)"},{"issue":"4","key":"18_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSECP.2003.1219058","volume":"1","author":"C Collberg","year":"2003","unstructured":"Collberg, C., Myles, G., Huntwork, A.: Sandmark-a tool for software protection research. IEEE Secur. Priv. 1(4), 40\u201349 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"18_CR7","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection","author":"C Collberg","year":"2009","unstructured":"Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 1st edn. Addison-Wesley Professional, Boston (2009)","edition":"1"},{"key":"18_CR8","unstructured":"Contagio Mini Dump: Pokemon GO with Droidjack - Android sample (2016). http:\/\/contagiominidump.blogspot.com"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-33167-1_3","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J Crussell","year":"2012","unstructured":"Crussell, J., Gibler, C., Chen, H.: Attack of the clones: detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37\u201354. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33167-1_3"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-40203-6_11","volume-title":"Computer Security \u2013 ESORICS 2013","author":"J Crussell","year":"2013","unstructured":"Crussell, J., Gibler, C., Chen, H.: AnDarwin: scalable detection of semantically similar android applications. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 182\u2013199. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40203-6_11"},{"key":"18_CR11","unstructured":"Goodin, D.: Fake Pok\u00e9mon Go app on Google Play infects phones with screenlocker (2016). http:\/\/arstechnica.com\/security\/2016\/07\/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker\/"},{"key":"18_CR12","unstructured":"DARPA: Automated Program Analysis for Cybersecurity (APAC) (2012). http:\/\/www.darpa.mil\/program\/automated-program-analysis-for-cybersecurity"},{"key":"18_CR13","unstructured":"Desnos, A.: AndroGuard, May 2013. http:\/\/androguard.blogspot.com\/"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Duan, Y., et al.: Things you may not know about android (un) packers: a systematic study based on whole-system emulation. In: 25th Annual Network and Distributed System Security Symposium, NDSS, San Diego, CA, pp. 18\u201321 (2018)","DOI":"10.14722\/ndss.2018.23296"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp. 576\u2013587. ACM, New York (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-30806-7_6","volume-title":"Engineering Secure Software and Systems","author":"Q Guan","year":"2016","unstructured":"Guan, Q., Huang, H., Luo, W., Zhu, S.: Semantics-based repackaging detection for mobile apps. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 89\u2013105. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30806-7_6"},{"key":"18_CR17","unstructured":"I. IDC Research: Smartphone OS Market Share, 2015 Q2. IDC Research Report (2015)"},{"key":"18_CR18","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2003.001.0001","volume-title":"Computability and Complexity: From a Programming Perspective","author":"ND Jones","year":"1997","unstructured":"Jones, N.D.: Computability and Complexity: From a Programming Perspective. MIT Press, Cambridge (1997)"},{"key":"18_CR19","unstructured":"Sullivan, J.: Pok\u00e9mon Go bundles with malicious remote administration tool DroidJack (2016). http:\/\/blog.trustlook.com\/2016\/09\/02\/pokemon-go-bundles-with-malicious-remote-administration-tool-droidjack\/"},{"key":"18_CR20","unstructured":"Cannell, J.: Obfuscation: malware\u2019s best friend (2013). https:\/\/blog.malwarebytes.com\/threat-analysis\/2013\/03\/obfuscation-malwares-best-friend\/"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Junaid, M., Liu, D., Kung, D.C.: Dexteroid: detecting malicious behaviors in android apps using reverse-engineered life cycle models. CoRR arXiv:1506.05217 (2015)","DOI":"10.1016\/j.cose.2016.01.008"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Komondoor, R., Horwitz, S.: Semantics-preserving procedure extraction. In: Proceedings of the ACM Symposium on Principles of Programming Languages, pp. 155\u2013169 (2000)","DOI":"10.1145\/325694.325713"},{"key":"18_CR23","unstructured":"Konstantinou, E.: Metamorphic virus: analysis and detection. Technical Report RHUL-MA-2008-02, Royal Holloway, University of London, January 2008"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Robertson, W., Vigna, G.: Detecting kernel-level rootkits through binary analysis. In: Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC\u201904, Tucson, AZ, USA, pp. 91\u2013100 (2004)","DOI":"10.1109\/CSAC.2004.19"},{"key":"18_CR25","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-37228-6_11","volume-title":"Security and Privacy in Communication Networks","author":"Z Li","year":"2019","unstructured":"Li, Z., Sun, J., Yan, Q., Srisa-an, W., Tsutano, Y.: Obfusifier: obfuscation-resistant android malware detection system. In: Chen, S., Choo, K.-K.R., Fu, X., Lou, W., Mohaisen, A. (eds.) SecureComm 2019. LNICST, vol. 304, pp. 214\u2013234. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37228-6_11"},{"key":"18_CR26","unstructured":"Linux Foundation: JavaAPI Compliance Checker (2015). http:\/\/ispras.linuxbase.org\/index.php\/Java_API_Compliance_Checker"},{"key":"18_CR27","unstructured":"Mr.Trojans. ALAN - Android Malware Evaluating Tools Released (2015). http:\/\/seclist.us\/alan-android-malware-evaluating-tools-released.html"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Myles, G., Collberg, C.: K-gram based software birthmarks. In: Proceedings of the 2005 ACM Symposium on Applied Computing, SAC\u201905, Santa Fe, New Mexico, pp. 314\u2013318 (2005)","DOI":"10.1145\/1066677.1066753"},{"key":"18_CR29","unstructured":"National Cyber Security Center (UK): Code Obfuscation (2014). https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/guidance_files\/Code-obfuscation.pdf"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Partush, N., Yahav, E.: Abstract semantic differencing via speculative correlation. In: SIGPLAN Not., vol. 49, no. 10, pp. 811\u2013828 (2014)","DOI":"10.1145\/2714064.2660245"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Person, S., Dwyer, M.B., Elbaum, S., P\u01ces\u01cereanu, C.S.: Differential symbolic execution. In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, SIGSOFT\u201908\/FSE-16, pp. 226\u2013237. ACM, New York (2008)","DOI":"10.1145\/1453101.1453131"},{"key":"18_CR32","unstructured":"Pomilia, M.: A study on obfuscation techniques for android malware. Technical Report, Sapienza University of Rome, March 2016. http:\/\/midlab.diag.uniroma1.it\/articoli\/matteo_pomilia_master_thesis.pdf"},{"issue":"3","key":"18_CR33","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11416-016-0282-2","volume":"13","author":"MD Preda","year":"2016","unstructured":"Preda, M.D., Maggi, F.: Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology. J. Comput. Virol. Hacking Tech. 13(3), 209\u2013232 (2016). https:\/\/doi.org\/10.1007\/s11416-016-0282-2","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"18_CR34","unstructured":"Proofpoint Staff: DroidJack Uses Side-Load...It\u2019s Super Effective! Backdoored Pokemon GO Android App Found (2016). https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/droidjack-uses-side-load-backdoored-pokemon-go-android-app"},{"key":"18_CR35","unstructured":"Rad, B.B., Masrom, M.: Metamorphic virus variants classification using opcode frequency histogram. In: Proceedings of the International Conference on Computers, pp. 147\u2013155 (2010)"},{"key":"18_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/978-3-642-22110-1_55","volume-title":"Computer Aided Verification","author":"DA Ramos","year":"2011","unstructured":"Ramos, D.A., Engler, D.R.: Practical, low-effort equivalence verification of real code. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 669\u2013685. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_55"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: DroidChameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 329\u2013334 (2013)","DOI":"10.1145\/2484313.2484355"},{"key":"18_CR38","volume-title":"The Boost Graph Library: User Guide and Reference Manual","author":"JG Siek","year":"2002","unstructured":"Siek, J.G., Lee, L.-Q., Lumsdaine, A.: The Boost Graph Library: User Guide and Reference Manual. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Tsutano, Y., Bachala, S., Srisa-an, W., Rothermel, G., Dinh, J.: An efficient, robust, and scalable approach for analyzing interacting android apps. In: Proceedings of the International Conference on Software Engineering, Buenos Aires, Argentina, May 2017","DOI":"10.1109\/ICSE.2017.37"},{"key":"18_CR40","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.cola.2018.12.004","volume":"52","author":"Y Tsutano","year":"2019","unstructured":"Tsutano, Y., Bachala, S., Srisa-an, W., Rothermel, G., Dinh, J.: JITANA: a modern hybrid program analysis framework for android platforms. J. Comput. Lang. 52, 55\u201371 (2019)","journal-title":"J. Comput. Lang."},{"issue":"3","key":"18_CR41","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-006-0028-7","volume":"2","author":"W Wong","year":"2006","unstructured":"Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211\u2013229 (2006)","journal-title":"J. Comput. Virol."},{"key":"18_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-662-43936-4_9","volume-title":"Data and Applications Security and Privacy XXVIII","author":"Y Zhauniarovich","year":"2014","unstructured":"Zhauniarovich, Y., Gadyatskaya, O., Crispo, B., La Spina, F., Moser, E.: FSquaDRA: fast detection of repackaged applications. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 130\u2013145. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43936-4_9"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94822-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T03:03:48Z","timestamp":1726628628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94822-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030948214","9783030948221"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94822-1_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiQuitous","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiquitous2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobiquitous.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}