{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:41:06Z","timestamp":1742946066642,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031063640"},{"type":"electronic","value":"9783031063657"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06365-7_12","type":"book-chapter","created":{"date-parts":[[2022,6,3]],"date-time":"2022-06-03T07:04:08Z","timestamp":1654239848000},"page":"194-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding the\u00a0Brains and\u00a0Brawn of\u00a0Illicit Streaming App"],"prefix":"10.1007","author":[{"given":"Kong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Ke","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiongyi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Menghan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Di","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Kehuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,4]]},"reference":[{"key":"12_CR1","unstructured":"Illegal IPTV in the European Union (2019). https:\/\/www.europol.europa.eu\/sites\/default\/files\/documents\/tb0319764enn.en_.pdf"},{"key":"12_CR2","unstructured":"Ultimate Mobile App Stores List (2019). https:\/\/buildfire.com\/mobile-app-stores-list\/"},{"key":"12_CR3","unstructured":"Adcolony (2020). https:\/\/www.adcolony.com"},{"key":"12_CR4","unstructured":"AdColony receives TAG Certified against fraud recertification for third year running (2020). https:\/\/www.globenewswire.com\/news-release\/2020\/03\/12\/1999716\/0\/en\/AdColony-Receives-TAG-Certified-Against-Fraud-Recertification-for-Third-Year-Running.html"},{"key":"12_CR5","unstructured":"Applovin (2020). https:\/\/www.applovin.com"},{"key":"12_CR6","unstructured":"Archive for binstream.io by web.archive.org (2020). https:\/\/web.archive.org\/web\/20181214170646\/www.binstream.io\/"},{"key":"12_CR7","unstructured":"Github (2020). https:\/\/github.com"},{"key":"12_CR8","unstructured":"Glispa Connect (Formerly Avocarrot) (2020). https:\/\/www.glispa.com\/connect\/"},{"key":"12_CR9","unstructured":"Mopub (2020). https:\/\/www.mopub.com\/en"},{"key":"12_CR10","unstructured":"Ogury acquires AdinCube (2020). https:\/\/ogury.com\/blog\/ogury-acquires-adincube-faq\/"},{"key":"12_CR11","unstructured":"Quark-Engine (2020). https:\/\/github.com\/quark-engine\/quark-engine"},{"key":"12_CR12","unstructured":"Top Best Independent App Stores For Free Apps [2020] (2020). https:\/\/medium.com\/codixlab\/top-best-independent-app-stores-for-free-apps-2020-adf25bc55fd3"},{"key":"12_CR13","unstructured":"Vitamio by yixia.com (2020). https:\/\/github.com\/yixia\/VitamioBundle"},{"key":"12_CR14","unstructured":"Vungle (2020). https:\/\/vungle.com"},{"key":"12_CR15","unstructured":"What is illicit streaming? (2020). https:\/\/thepcdoc.co.uk\/illicit-streaming\/"},{"key":"12_CR16","unstructured":"Asia Video Industry Association (2021). https:\/\/avia.org\/"},{"key":"12_CR17","unstructured":"Premier League (2021). https:\/\/www.premierleague.com\/"},{"key":"12_CR18","unstructured":"Alliance, D.C.: Boxed in: Hackers targeting piracy devices and apps to infect users with malware (2019). https:\/\/www.digitalcitizensalliance.org\/news\/press-releases-2019\/boxed-in-hackers-targeting-piracy-devices-and-apps-to-infect-users-with-malware-report-finds-copy\/"},{"key":"12_CR19","unstructured":"Androguard_Team: A full python tool to play with android files. https:\/\/github.com\/androguard\/androguard"},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"Baumann, R., Protsenko, M., M\u00fcller, T.: Anti-ProGuard. In: Proceedings of the 4th Workshop on Security in Highly Connected IT Systems - SHCIS 2017. ACM Press (2017). https:\/\/doi.org\/10.1145\/3099012.3099020, https:\/\/doi.org\/10.1145\/3099012.3099020","DOI":"10.1145\/3099012.3099020"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Bichsel, B., Raychev, V., Tsankov, P., Vechev, M.: Statistical deobfuscation of android applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 343\u2013355. ACM (2016)","DOI":"10.1145\/2976749.2978422"},{"key":"12_CR22","unstructured":"Bushnell, H.: Inside the complex world of illegal sports streaming. Muso Magazine (2019). https:\/\/www.muso.com\/magazine\/inside-the-complex-world-of-illegal-sports-streaming\/"},{"key":"12_CR23","unstructured":"CNN: Why Fox and Disney hate Singapore\u2019s little black boxes (2018). https:\/\/money.cnn.com\/2018\/04\/05\/media\/singapore-piracy-black-boxes\/index.html"},{"key":"12_CR24","unstructured":"Mostert, F., Lambert, J.: Study on IP enforcement measures, especially anti-piracy measures in the digital environment (2019). https:\/\/www.wipo.int\/edocs\/mdocs\/enforcement\/en\/wipo_ace_14\/wipo__4_7-annex1.pdf"},{"key":"12_CR25","unstructured":"FACT: cracking down on digital piracy report (2017). https:\/\/www.fact-uk.org.uk\/files\/2017\/09\/Cracking-Down-on-Digital-Piracy-Report-Sept-2017.pdf"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S Hanna","year":"2013","unstructured":"Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: a scalable system for detecting code reuse among android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 62\u201381. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37300-8_4"},{"key":"12_CR27","unstructured":"Hawkes, R.: Eight arrests in HK content piracy crack down (2018). https:\/\/www.rapidtvnews.com\/2018052952282\/eight-arrests-in-hk-content-piracy-crack-down.html"},{"key":"12_CR28","doi-asserted-by":"publisher","unstructured":"Hsiao, L., Ayers, H.: The price of free illegal live streaming services (2019). https:\/\/doi.org\/10.48550\/arXiv.1901.00579","DOI":"10.48550\/arXiv.1901.00579"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Ibosiola, D., Steer, B., Garc\u00eda-Recuero, \u00c1., Stringhini, G., Uhlig, S., Tyson, G.: Movie pirates of the caribbean: exploring illegal streaming cyberlockers. In: ICWSM (2018)","DOI":"10.1609\/icwsm.v12i1.15008"},{"key":"12_CR30","doi-asserted-by":"publisher","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: DECKARD: scalable and accurate tree-based detection of code clones. In: 29th International Conference on Software Engineering (ICSE 2007). IEEE, May 2007. https:\/\/doi.org\/10.1109\/icse.2007.30, https:\/\/doi.org\/10.1109\/icse.2007.30","DOI":"10.1109\/icse.2007.30"},{"key":"12_CR31","doi-asserted-by":"publisher","unstructured":"Johnson, R., Kiourtis, N., Stavrou, A., Sritapan, V.: Analysis of content copyright infringement in mobile application markets. In: 2015 APWG Symposium on Electronic Crime Research (eCrime). IEEE, May 2015. https:\/\/doi.org\/10.1109\/ecrime.2015.7120798, https:\/\/doi.org\/10.1109\/ecrime.2015.7120798","DOI":"10.1109\/ecrime.2015.7120798"},{"key":"12_CR32","doi-asserted-by":"publisher","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng. 28(7), 654\u2013670 (2002). https:\/\/doi.org\/10.1109\/tse.2002.1019480","DOI":"10.1109\/tse.2002.1019480"},{"key":"12_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-47764-0_3","volume-title":"Static Analysis","author":"R Komondoor","year":"2001","unstructured":"Komondoor, R., Horwitz, S.: Using slicing to identify duplication in source code. In: Cousot, P. (ed.) SAS 2001. LNCS, vol. 2126, pp. 40\u201356. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-47764-0_3"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Li, M., et al.: LIBD: scalable and precise third-party library detection in android markets. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 335\u2013346. IEEE (2017)","DOI":"10.1109\/ICSE.2017.38"},{"key":"12_CR35","doi-asserted-by":"publisher","unstructured":"Luo, L., Ming, J., Wu, D., Liu, P., Zhu, S.: Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection. IEEE Trans. Softw. Eng. 43(12), 1157\u20131177 (2017). https:\/\/doi.org\/10.1109\/tse.2017.2655046","DOI":"10.1109\/tse.2017.2655046"},{"key":"12_CR36","doi-asserted-by":"publisher","unstructured":"Moghaddam, H.M., et al.: Watching you watch. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS 2019. ACM Press (2019). https:\/\/doi.org\/10.1145\/3319535.3354198, https:\/\/doi.org\/10.1145\/3319535.3354198","DOI":"10.1145\/3319535.3354198"},{"key":"12_CR37","unstructured":"MSSUN: Android Apps Crawler (2014). https:\/\/github.com\/mssun\/android-apps-crawler"},{"key":"12_CR38","unstructured":"MTS, F.: Global monitoring platform (2019). https:\/\/www.friendmts.com\/channel-protection\/global-monitoring-platform\/"},{"key":"12_CR39","doi-asserted-by":"publisher","unstructured":"Nikas, A., Alepis, E., Patsakis, C.: I know what you streamed last night: On the security and privacy of streaming. Digit. Invest. 25, 78\u201389 (2018). https:\/\/doi.org\/10.1016\/j.diin.2018.03.004, https:\/\/doi.org\/10.1016\/j.diin.2018.03.004","DOI":"10.1016\/j.diin.2018.03.004"},{"key":"12_CR40","unstructured":"UK Intellectual Property Office: Guidance about illicit streaming devices (2017). https:\/\/www.gov.uk\/government\/publications\/illicit-streaming-devices\/illicit-streaming-devices"},{"key":"12_CR41","unstructured":"OpSec: Antipiracy live streaming protection (2020). https:\/\/www.opsecsecurity.com\/opsec-online\/antipiracy-live-streaming-protection"},{"key":"12_CR42","doi-asserted-by":"publisher","unstructured":"Pandey, P., Aliapoulios, M., McCoy, D.: Iniquitous cord-cutting: An analysis of infringing IPTV services. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE (2019). https:\/\/doi.org\/10.1109\/eurospw.2019.00054","DOI":"10.1109\/eurospw.2019.00054"},{"key":"12_CR43","unstructured":"Rafique, M.Z., van Goethem, T., Joosen, W., Huygens, C., Nikiforakis, N.: It\u2019s free for a reason: exploring the ecosystem of free live streaming services. In: NDSS (2016)"},{"key":"12_CR44","unstructured":"Sandvine: 2017 Internet Phenomena - Subscription Television Piracy (2017). https:\/\/www.sandvine.com\/hubfs\/downloads\/archive\/2017-global-internet-phenomena-spotlight-subscription-television-piracy.pdf"},{"key":"12_CR45","doi-asserted-by":"crossref","unstructured":"Sounthiraraj, D., Sahs, J., Greenwood, G., Lin, Z., Khan, L.: SMV-hunter: large scale, automated detection of SSL\/TLS man-in-the-middle vulnerabilities in android apps. In: In Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS 2014). Citeseer (2014)","DOI":"10.14722\/ndss.2014.23205"},{"key":"12_CR46","unstructured":"Wikipedia: Jaccard index (2020). https:\/\/en.wikipedia.org\/wiki\/Jaccard_index"},{"key":"12_CR47","unstructured":"Wikipedia: Kotlin (programming language) (2020). https:\/\/en.wikipedia.org\/wiki\/Kotlin_(programming_language)"},{"key":"12_CR48","unstructured":"Wikipedia: Md5 (2020). https:\/\/en.wikipedia.org\/wiki\/MD5"},{"key":"12_CR49","unstructured":"Wikipedia: pcap (2020). https:\/\/en.wikipedia.org\/wiki\/Pcap"},{"key":"12_CR50","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Luo, X., Yin, H.: DexHunter: toward extracting hidden code from packed android applications. In: Computer Security - ESORICS 2015, pp. 293\u2013311. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_15","DOI":"10.1007\/978-3-319-24177-7_15"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06365-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T04:07:33Z","timestamp":1675742853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06365-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031063640","9783031063657"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06365-7_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdf2c.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}