{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:28:11Z","timestamp":1742912891910,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030948214"},{"type":"electronic","value":"9783030948221"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94822-1_19","type":"book-chapter","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T13:03:04Z","timestamp":1644325384000},"page":"347-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ReHAna: An Efficient Program Analysis Framework to Uncover Reflective Code in Android"],"prefix":"10.1007","author":[{"given":"Shakthi","family":"Bachala","sequence":"first","affiliation":[]},{"given":"Yutaka","family":"Tsutano","sequence":"additional","affiliation":[]},{"given":"Witawas","family":"Srisa-an","sequence":"additional","affiliation":[]},{"given":"Gregg","family":"Rothermel","sequence":"additional","affiliation":[]},{"given":"Jackson","family":"Dinh","sequence":"additional","affiliation":[]},{"given":"Yuanjiu","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"19_CR1","unstructured":"Abraham, J., Jones, P., Jetley, R.: A formal methods-based verification approach to medical device software analysis, February 2010. https:\/\/www.embedded.com\/a-formal-methods-based-verification-approach-to-medical-device-software-analysis\/"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Barros, P., et al.: Static analysis of implicit control flow: resolving Java reflection and android intents (t). In: Proceedings of the 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), ASE 2015, pp. 669\u2013679, Lincoln, NE, USA, November 2015","DOI":"10.1109\/ASE.2015.69"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bodden, E., Sewe, A., Sinschek, J., Oueslati, H., Mezini, M.: Taming reflection: aiding static analysis in the presence of reflection and custom class loaders. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 241\u2013250, Honolulu, Hawaii, USA, May 2011","DOI":"10.1145\/1985793.1985827"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bond, M.D., Coons, K.E., McKinley, K.S.: PACER: proportional detection of data races. In: Proceedings of the Conference on Programming Language Design and Implementation, pp. 255\u2013268, Toronto, Ontario, Canada, June 2010","DOI":"10.1145\/1809028.1806626"},{"key":"19_CR5","unstructured":"Chandra, B.: A technical view of the open SSL heartbleed vulnerability, May 2014. https:\/\/www.ibm.com\/developerworks\/community\/files\/form\/anonymous\/api\/library\/38218957-7195-4fe9-812a-10b7869e4a87\/document\/ab12b05b-9f07-4146-8514-18e22bd5408c\/media"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Mass discovery of android traffic imprints through instantiated partial execution. In: Proceedings of CCS, pp. 815\u2013828, Dallas, Texas, USA (2017)","DOI":"10.1145\/3133956.3134009"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Choudhary, S.R., Gorla, A., Orso, A.: Automated test input generation for android: are we there yet? In: Proceedings of the 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), ASE 2015, pp. 429\u2013440 (2015)","DOI":"10.1109\/ASE.2015.89"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Davis, B., Chen, H.: Retroskeleton: retrofitting android apps. In: Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2013, pp. 181\u2013192, New York, NY, USA. ACM (2013)","DOI":"10.1145\/2462456.2464462"},{"key":"19_CR9","unstructured":"Desnos, A.: Androguard: reverse engineering, malware and goodware analysis of android applications (2013). https:\/\/github.com\/androguard\/androguard"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Duan, Y., et al.: Things you may not know about android (Un)packers: a systematic study based on whole-system emulation. In: Proceedings of Network and Distributed System Security Symposium, NDSS, San Diego, California, USA, February 2018","DOI":"10.14722\/ndss.2018.23296"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 627\u2013638, New York, NY, USA. ACM (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"19_CR12","unstructured":"GeeksforGeeks. ClassLoader in Java, May 201r. https:\/\/www.geeksforgeeks.org\/classloader-in-java\/"},{"key":"19_CR13","unstructured":"Google. Lint (2019). http:\/\/tools.android.com\/tips\/lint"},{"key":"19_CR14","unstructured":"Jim, T.: Legacy C\/C++ code is a nuclear waste nightmare that will make you WannaCry, June 2017. http:\/\/trevorjim.com"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Landman, D., Serebrenik, A., Vinju, J.: Challenges for static analysis of java reflection - literature review and empirical study. In: Proceedings of the International Conference on Software Engineering, Buenos Aires, Argentina, May 2017","DOI":"10.1109\/ICSE.2017.53"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Li, L., Bissyand\u00e9, T.F., Octeau, D., Klein, J.: Droidra: taming reflection to support whole-program analysis of android apps. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA 2016, pp. 318\u2013329, Saarbr\u00fccken, Germany (2016)","DOI":"10.1145\/2931037.2931044"},{"issue":"2","key":"19_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3295739","volume":"28","author":"Y Li","year":"2019","unstructured":"Li, Y., Tan, T., Xue, J.: Understanding and analyzing java reflection. ACM Trans. Softw. Eng. Methodol. 28(2), 1\u201350 (2019)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"19_CR18","unstructured":"Liang, S., Might, M., Horn, D.V.: Android: malware analysis of android with user-supplied predicates. CoRR, abs\/1311.4198 (2013)"},{"key":"19_CR19","unstructured":"Livshits, V.B., Lam, M.S.: Finding security vulnerabilities in java applications with static analysis. In: Proceedings of the 14th Conference on USENIX Security Symposium, SSYM 2005, vol. 14 (2005)"},{"key":"19_CR20","unstructured":"Oracle Corp. Loading, linking, and initializing, November 2019. https:\/\/docs.oracle.com\/javase\/specs\/jvms\/se7\/html\/jvms-5.html"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., Vigna, G.: Execute this! analyzing unsafe and malicious dynamic code loading in android applications. In: Proceedings of NDSS, vol. 14, pp. 23\u201326, San Diego, CA (2014)","DOI":"10.14722\/ndss.2014.23328"},{"key":"19_CR22","unstructured":"Ponomariov, P.: Shedun: adware\/malware family threatening your Android device, September 2015. https:\/\/blog.avira.com\/shedun\/"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Miltenberger, M., Bodden, E.: Harvesting runtime values in android applications that feature anti-analysis techniques. In: Proceedings of NDSS (2016)","DOI":"10.14722\/ndss.2016.23066"},{"issue":"4","key":"19_CR24","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/A:1024597010150","volume":"31","author":"S Rus","year":"2003","unstructured":"Rus, S., Rauchwerger, L., Hoeflinger, J.: Hybrid analysis: static & dynamic memory reference analysis. Int. J. Parallel Program. 31(4), 251\u2013283 (2003)","journal-title":"Int. J. Parallel Program."},{"issue":"2","key":"19_CR25","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s10515-009-0049-9","volume":"16","author":"J Sawin","year":"2009","unstructured":"Sawin, J., Rountev, A.: Improving static resolution of dynamic class loading in java using dynamically gathered environment information. Autom. Softw. Eng. 16(2), 357\u2013381 (2009)","journal-title":"Autom. Softw. Eng."},{"key":"19_CR26","volume-title":"Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)","author":"J Smith","year":"2005","unstructured":"Smith, J., Nair, R.: Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design). Morgan Kaufmann Publishers Inc., San Francisco (2005)"},{"key":"19_CR27","unstructured":"Sp\u00e4th, J., Lam, P.: Using Soot and TamiFlex to analyze DaCapo, August 2014. https:\/\/github.com\/Sable\/soot\/wiki\/Using-Soot-and-TamiFlex-to-analyze-DaCapo"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Tikir, M., Hollingsworth, J.K.: Efficient instrumentation for code coverage testing. In: Proceedings of the 2002 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2002, pp. 86\u201396, Roma, Italy (2002)","DOI":"10.1145\/566171.566186"},{"key":"19_CR29","unstructured":"Vall\u00e9e-Rai, R.: Soot: a java bytecode optimization framework. Master\u2019s thesis, McGill University (2000)"},{"key":"19_CR30","series-title":"Systems, and Applications","first-page":"678","volume-title":"Wireless Algorithms","author":"D Wu","year":"2017","unstructured":"Wu, D., Liu, X., Xu, J., Lo, D., Gao, D.: Measuring the declared SDK versions and their consistency with API calls in android apps. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds.) Wireless Algorithms. Systems, and Applications, pp. 678\u2013690. Springer, Cham (2017)"},{"key":"19_CR31","unstructured":"Xu, L.: Techniques and tools for analyzing and understanding android applications. PhD thesis, University of California, Davis (2013)"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B., Massacci, F.: StaDynA: addressing the problem of dynamic code updates in the security analysis of android applications. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, pp. 37\u201348, San Antonio, Texas, USA (2015)","DOI":"10.1145\/2699026.2699105"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94822-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T19:12:44Z","timestamp":1652123564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94822-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030948214","9783030948221"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94822-1_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiQuitous","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiquitous2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobiquitous.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}