{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:08:13Z","timestamp":1761581293237,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319159423"},{"type":"electronic","value":"9783319159430"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15943-0_15","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T10:27:17Z","timestamp":1426501637000},"page":"241-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Detecting Camouflaged Applications on Mobile Application Markets"],"prefix":"10.1007","author":[{"given":"Su Mon","family":"Kywe","sequence":"first","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Balanza, M., Abendan, O., Alintanahin, K., Dizon, J., Caraig, B.: Droiddreamlight lurks behind legitimate android apps. In: Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, pp. 73\u201378. IEEE Computer Society, Washington, DC (2011)","key":"15_CR1","DOI":"10.1109\/MALWARE.2011.6112329"},{"doi-asserted-by":"crossref","unstructured":"Chen, H.: Underground economy of android application plagiarism. In: Proceedings of the First International Workshop on Security in Embedded Systems and Smartphones, SESP 2013, pp. 1\u20132. ACM, New York (2013)","key":"15_CR2","DOI":"10.1145\/2484417.2484419"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-33167-1_3","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J Crussell","year":"2012","unstructured":"Crussell, J., Gibler, C., Chen, H.: Attack of the clones: detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37\u201354. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Crussell, J., Gibler, C., Chen, H.: Scalable semantics-based detection of similar android applications. In: 18th European Symposium on Research in Computer Security, ESORICS 2013, Egham, U.K. (2013)","key":"15_CR4","DOI":"10.1007\/978-3-642-40203-6_11"},{"doi-asserted-by":"crossref","unstructured":"Desnos, A.: Android: static analysis using similarity distance. In: Proceedings of the 2012 45th Hawaii International Conference on System Sciences, HICSS 2012, pp. 5394\u20135403. IEEE Computer Society, Washington, DC (2012)","key":"15_CR5","DOI":"10.1109\/HICSS.2012.114"},{"doi-asserted-by":"crossref","unstructured":"Gibler, C., Stevens, R., Crussell, J., Chen, H., Zang, H., Choi, H.: Adrob: Examining the landscape and impact of android application plagiarism. In: Proceedings of 11th International Conference on Mobile Systems, Applications and Services (2013)","key":"15_CR6","DOI":"10.1145\/2462456.2464461"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S Hanna","year":"2013","unstructured":"Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: a scalable system for detecting code reuse among android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 62\u201381. Springer, Heidelberg (2013)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-38908-5_13","volume-title":"Trust and Trustworthy Computing","author":"H Huang","year":"2013","unstructured":"Huang, H., Zhu, S., Liu, P., Wu, D.: A framework for evaluating mobile app repackaging detection algorithms. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol. 7904, pp. 169\u2013186. Springer, Heidelberg (2013)"},{"unstructured":"Huang, J., Kumar, S.R., Mitra, M., Zhu, W.-J., Zabih, R.: Image indexing using color correlograms. In: Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition (CVPR 1997), CVPR 1997, pp. 762\u2013768. IEEE Computer Society, Washington, DC (1997)","key":"15_CR9"},{"doi-asserted-by":"crossref","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: scalable and accurate tree-based detection of code clones. In: Proceedings of the 29th International Conference on Software Engineering, ICSE 2007, pp. 96\u2013105. IEEE Computer Society, Washington, DC (2007)","key":"15_CR10","DOI":"10.1109\/ICSE.2007.30"},{"issue":"4","key":"15_CR11","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1007\/s11277-013-1258-x","volume":"73","author":"J-H Jung","year":"2013","unstructured":"Jung, J.-H., Kim, J.Y., Lee, H.-C., Yi, J.H.: Repackaging attack on android banking applications and its countermeasures. Wirel. Pers. Commun. 73(4), 1421\u20131437 (2013)","journal-title":"Wirel. Pers. Commun."},{"doi-asserted-by":"crossref","unstructured":"Ko, J., Shim, H., Kim, D., Jeong, Y.-S., Cho, S.-J., Park, M., Han, S., Kim, S.B.: Measuring similarity of android applications via reversing and k-gram birthmarking. In: Proceedings of the 2013 Research in Adaptive and Convergent Systems, RACS 2013, pp. 336\u2013341. ACM, New York (2013)","key":"15_CR12","DOI":"10.1145\/2513228.2513308"},{"unstructured":"Li, S.: Juxtapp and DStruct: detection of similarity among android applications. Master\u2019s thesis, EECS Department, University of California, Berkeley, May 2012","key":"15_CR13"},{"key":"15_CR14","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-01604-7_40","volume-title":"Information Sciences and Systems 2013","author":"S Liebergeld","year":"2013","unstructured":"Liebergeld, S., Lange, M.: Android security, pitfalls and lessons learned. In: Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2013. LNEE, vol. 264, pp. 409\u2013417. Springer, Heidelberg (2013)"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.cose.2013.08.010","volume":"39","author":"Y-D Lin","year":"2013","unstructured":"Lin, Y.-D., Lai, Y.-C., Chen, C.-H., Tsai, H.-C.: Identifying android malicious repackaged applications by thread-grained system call sequences. Comput. Secur. 39, 340\u2013350 (2013)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Lux, M., Chatzichristofis, S.A.: Lire: lucene image retrieval: an extensible java cbir library. In: Proceedings of the 16th ACM International Conference on Multimedia, MM 2008, pp. 1085\u20131088. ACM, New York (2008)","key":"15_CR16","DOI":"10.1145\/1459359.1459577"},{"doi-asserted-by":"crossref","unstructured":"Marques, O., Lux, M.: Visual information retrieval using java and lire. In: Hersh, W.R., Callan, J., Maarek, Y., Sanderson, M. (eds.) SIGIR, p. 1193. ACM (2012)","key":"15_CR17","DOI":"10.1145\/2348283.2348538"},{"key":"15_CR18","volume-title":"Lucene in Action: Covers Apache Lucene 3.0","author":"M McCandless","year":"2010","unstructured":"McCandless, M., Hatcher, E., Gospodnetic, O.: Lucene in Action: Covers Apache Lucene 3.0, 2nd edn. Manning Publications Co., Greenwich (2010)","edition":"2"},{"unstructured":"Orland, K.: Fake pokemon yellow rises to no. 3 position on itunes app charts (2012)","key":"15_CR19"},{"unstructured":"Play, G.: Intellectual property","key":"15_CR20"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-28166-2_11","volume-title":"Engineering Secure Software and Systems","author":"R Potharaju","year":"2012","unstructured":"Potharaju, R., Newell, A., Nita-Rotaru, C., Zhang, X.: Plagiarizing smartphone applications: attack strategies and defense techniques. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 106\u2013120. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Vidas, T., Christin, N.: Sweetening android lemon markets: measuring and combating malware in application marketplaces. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, pp. 197\u2013208. ACM, New York (2013)","key":"15_CR22","DOI":"10.1145\/2435349.2435378"},{"issue":"9","key":"15_CR23","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/34.955109","volume":"23","author":"JZ Wang","year":"2001","unstructured":"Wang, J.Z., Li, J., Wiederhold, G.: Simplicity: semantics-sensitive integrated matching for picture libraries. IEEE Trans. Pattern Anal. Mach. Intell. 23(9), 947\u2013963 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J.I.: A hybrid phish detection approach by identity discovery and keywords retrieval. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, pp. 571\u2013580. ACM, New York (2009)","key":"15_CR24","DOI":"10.1145\/1526709.1526786"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 639\u2013648. ACM, New York (2007)","key":"15_CR25","DOI":"10.1145\/1242572.1242659"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-37300-8_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Zheng","year":"2013","unstructured":"Zheng, M., Lee, P.P.C., Lui, J.C.S.: ADAM: an automatic and extensible platform to stress test android anti-virus systems. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 82\u2013101. Springer, Heidelberg (2013)"},{"doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhang, X., Jiang, X.: Appink: watermarking android apps for repackaging deterrence. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, pp. 1\u201312. ACM, New York (2013)","key":"15_CR27","DOI":"10.1145\/2484313.2484315"},{"doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of \u201cpiggybacked\u201d mobile applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, pp. 185\u2013196. ACM, New York (2013)","key":"15_CR28","DOI":"10.1145\/2435349.2435377"},{"doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, pp. 317\u2013326. ACM, New York (2012)","key":"15_CR29","DOI":"10.1145\/2133601.2133640"},{"doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy, pp. 95\u2013109. IEEE Computer Society (2012)","key":"15_CR30","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15943-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T11:08:16Z","timestamp":1674904096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15943-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319159423","9783319159430"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15943-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}