{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T13:58:36Z","timestamp":1768744716767,"version":"3.49.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031491863","type":"print"},{"value":"9783031491870","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49187-0_11","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T12:02:36Z","timestamp":1701345756000},"page":"205-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Libra: Library Identification in\u00a0Obfuscated Android Apps"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8434-7122","authenticated-orcid":false,"given":"David A.","family":"Tomassi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7208-909X","authenticated-orcid":false,"given":"Kenechukwu","family":"Nwodo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5320-4985","authenticated-orcid":false,"given":"Mohamed","family":"Elsabagh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"11_CR1","unstructured":"Allatori. https:\/\/allatori.com\/"},{"key":"11_CR2","unstructured":"Dasho. https:\/\/www.preemptive.com\/products\/dasho\/"},{"key":"11_CR3","unstructured":"Get started with the NDK. https:\/\/developer.android.com\/ndk\/guides"},{"key":"11_CR4","unstructured":"Libdetect dataset. https:\/\/sites.google.com\/view\/libdetect\/home\/dataset"},{"key":"11_CR5","unstructured":"Maven repository: Central. https:\/\/mvnrepository.com\/repos\/central"},{"key":"11_CR6","unstructured":"Proguard. https:\/\/www.guardsquare.com\/proguard"},{"key":"11_CR7","unstructured":"Support Library $$|$$ Android Developers. https:\/\/developer.android.com\/topic\/libraries\/support-library"},{"key":"11_CR8","unstructured":"SolarWinds attack explained: And why it was so hard to detect (2020). https:\/\/www.csoonline.com\/article\/3601508\/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html"},{"key":"11_CR9","unstructured":"Synopsys research reveals significant security concerns in popular mobile apps amid pandemic (2021). https:\/\/news.synopsys.com\/2021-03-25-Synopsys-Research-Reveals-Significant-Security-Concerns-in-Popular-Mobile-Apps-Amid-Pandemic"},{"key":"11_CR10","unstructured":"Number of apps available in leading app stores as of 3rd quarter 2022 (2021). https:\/\/www.statista.com\/statistics\/276623\/number-of-apps-available-in-leading-app-stores\/"},{"key":"11_CR11","unstructured":"Numbers from Google I\/O: 3 billion active Android devices (2022). https:\/\/9to5google.com\/2022\/05\/11\/google-io-2022-numbers\/"},{"key":"11_CR12","unstructured":"Shrink, obfuscate, and optimize your app (2023). https:\/\/developer.android.com\/studio\/build\/shrink-code.html"},{"key":"11_CR13","unstructured":"Ali, M.: Sensors Sandbox. https:\/\/github.com\/mustafa01ali\/SensorsSandbox"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Almanee, S., \u00dcnal, A., Payer, M., Garcia, J.: Too quiet in the library: an empirical study of security updates in Android apps\u2019 native code. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). IEEE (2021)","DOI":"10.1109\/ICSE-Companion52605.2021.00072"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Backes, M., Bugiel, S., Derr, E.: Reliable third-party library detection in Android and its security applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978333"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Derr, E., Bugiel, S., Fahl, S., Acar, Y., Backes, M.: Keep me updated: an empirical study of third-party library updatability on Android. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134059"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Duan, R., Bijlani, A., Xu, M., Kim, T., Lee, W.: Identifying open-source license violation and 1-day security risk at large scale. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134048"},{"issue":"2","key":"11_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher, R.A.: The use of multiple measurements in taxonomic problems. Ann. Eugen. 7(2), 179\u2013188 (1936)","journal-title":"Ann. Eugen."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Glanz, L., et al.: CodeMatch: obfuscation won\u2019t conceal your repackaged app. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering (2017)","DOI":"10.1145\/3106237.3106305"},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s11277-018-5456-4","volume":"103","author":"H Han","year":"2018","unstructured":"Han, H., Li, R., Tang, J.: Identify and inspect libraries in Android applications. Wirel. Pers. Commun. 103(1), 491\u2013503 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Huang, J., et al.: Scalably detecting third-party Android libraries with two-stage bloom filtering. IEEE Trans. Softw. Eng. (2022)","DOI":"10.1109\/TSE.2022.3215628"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","volume":"3","author":"J Kornblum","year":"2006","unstructured":"Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digit. Investig. 3, 91\u201397 (2006)","journal-title":"Digit. Investig."},{"key":"11_CR23","unstructured":"Levenshtein, V.I., et al.: Binary codes capable of correcting deletions, insertions, and reversals. In: Soviet Physics Doklady (1966)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Li, M., et al.: LIBD: scalable and precise third-party library detection in Android markets. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE) (2017)","DOI":"10.1109\/ICSE.2017.38"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Liu, B., Liu, B., Jin, H., Govindan, R.: Efficient privilege de-escalation for ad libraries in mobile apps. In: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 89\u2013103 (2015)","DOI":"10.1145\/2742647.2742668"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Ma, Z., Wang, H., Guo, Y., Chen, X.: LibRadar: fast and accurate detection of third-party libraries in Android apps. In: Proceedings of the 38th International Conference on Software Engineering Companion (2016)","DOI":"10.1145\/2889160.2889178"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Chen, L., Chan, C.K.: AdDetect: automated detection of Android ad libraries using semantic analysis. In: 2014 IEEE Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (2014)","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"11_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100365","volume":"39","author":"V Sihag","year":"2021","unstructured":"Sihag, V., Vardhan, M., Singh, P.: A survey of Android application and malware hardening. Comput. Sci. Rev. 39, 100365 (2021)","journal-title":"Comput. Sci. Rev."},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Soh, C., Tan, H.B.K., Arnatovich, Y.L., Narayanan, A., Wang, L.: LibSift: automated detection of third-party libraries in Android applications. In: 2016 23rd Asia-Pacific Software Engineering Conference (APSEC) (2016)","DOI":"10.1109\/APSEC.2016.017"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Tang, W., Luo, P., Fu, J., Zhang, D.: LibDX: a cross-platform and accurate system to detect third-party libraries in binary code. In: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) (2020)","DOI":"10.1109\/SANER48275.2020.9054845"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Tang, Z., et al.: Securing Android applications via edge assistant third-party library detection. Comput. Secur. 80 (2019)","DOI":"10.1016\/j.cose.2018.07.024"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Wang, H., Guo, Y., Ma, Z., Chen, X.: Wukong: a scalable and accurate two-phase approach to Android app clone detection. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis (2015)","DOI":"10.1145\/2771783.2771795"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Y., Rountev, A.: Who changed you? Obfuscator identification for Android. In: 2017 IEEE\/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft), pp. 154\u2013164. IEEE (2017)","DOI":"10.1109\/MOBILESoft.2017.18"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wu, H., Zhang, H., Rountev, A.: ORLIS: obfuscation-resilient library detection for Android. In: 2018 IEEE\/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft) (2018)","DOI":"10.1145\/3197231.3197248"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: An empirical study of usages, updates and risks of third-party libraries in Java projects. In: 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 35\u201345. IEEE (2020)","DOI":"10.1109\/ICSME46990.2020.00014"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Xu, J., Yuan, Q.: LibRoad: rapid, online, and accurate detection of TPLs on Android. IEEE Trans. Mob. Comput. 21(1) (2020)","DOI":"10.1109\/TMC.2020.3003336"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Zhan, X., et al.: ATVHunter: reliable version detection of third-party libraries for vulnerability identification in Android applications. In: 43rd International Conference on Software Engineering (2021)","DOI":"10.1109\/ICSE43902.2021.00150"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Zhan, X., et al.: Automated third-party library detection for Android applications: are we there yet? In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 919\u2013930. IEEE (2020)","DOI":"10.1145\/3324884.3416582"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Zhan, X., et al.: Research on third-party libraries in Android apps: a taxonomy and systematic literature review. IEEE Trans. Softw. Eng. 48(10) (2022)","DOI":"10.1109\/TSE.2021.3114381"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, F., Huang, H., Zhu, S., Wu, D., Liu, P.: ViewDroid: towards obfuscation-resilient mobile application repackaging detection. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks (2014)","DOI":"10.1145\/2627393.2627395"},{"key":"11_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, J., Beresford, A.R., Kollmann, S.A.: LibID: reliable identification of obfuscated third-party Android libraries. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 55\u201365 (2019)","DOI":"10.1145\/3293882.3330563"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wang, J., Huang, H., Zhang, Y., Liu, P.: Understanding and conquering the difficulties in identifying third-party librariesfrom millions of Android apps. IEEE Trans. Big Data (2021)","DOI":"10.1109\/TBDATA.2021.3093244"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Detecting third-party libraries in Android applications with high precision and recall. In: IEEE 25th Conference on Software Analysis, Evolution and Reengineering (2018)","DOI":"10.1109\/SANER.2018.8330204"},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Diao, W., Hu, C., Guo, S., Zuo, C., Li, L.: An empirical study of potentially malicious third-party libraries in Android apps. In: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (2020)","DOI":"10.1145\/3395351.3399346"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49187-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:35:50Z","timestamp":1744148150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49187-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031491863","9783031491870"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49187-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc23.cs.rug.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}