{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:35:59Z","timestamp":1743057359866,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319421070"},{"type":"electronic","value":"9783319421087"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42108-7_7","type":"book-chapter","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T03:25:04Z","timestamp":1467343504000},"page":"87-105","source":"Crossref","is-referenced-by-count":0,"title":["The Design and Implementation on the Android Application Protection System"],"prefix":"10.1007","author":[{"given":"Cui","family":"Haoliang","sequence":"first","affiliation":[]},{"given":"Huang","family":"Ruqiang","sequence":"additional","affiliation":[]},{"given":"Shi","family":"Chengjie","sequence":"additional","affiliation":[]},{"given":"Niu","family":"Shaozhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"key":"7_CR1","unstructured":"2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE), pp. 725\u2013728. IEEE (2015)"},{"key":"7_CR2","unstructured":"Ji H.: The Research and Implement on Operating System of Mobile Phone on Android Platform, Southeast University (2010)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Qiu L, Zhang Z, Shen Z, et al.: AppTrace: Dynamic trace on Android devices. In: 2015 IEEE International Conference on Communications (ICC). IEEE (2015)","DOI":"10.1109\/ICC.2015.7249466"},{"key":"7_CR4","unstructured":"Collerg, C., Thomborson, C., Low, D., et al.: A taxonomy of obfuscating transformations. Department of Computer Science, The University of Auckland, New Zealand, July 1997"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"66","DOI":"10.3969\/j.issn.1002-5316.2015.01.013","volume":"45","author":"L Yanfei","year":"2015","unstructured":"Yanfei, L., Sha, F., et al.: Survey of software tamper proofing technique. Modern Telecommun. Tech. 45(1), 66\u201370 (2015). doi: 10.3969\/j.issn.1002-5316.2015.01.013 . 74","journal-title":"Modern Telecommun. Tech."},{"key":"7_CR6","first-page":"45","volume":"2","author":"S Haibo","year":"2005","unstructured":"Haibo, S., Yuda, S., et al.: Tamper-proofing technology of computer software. Modern Comput. Prof. 2, 45\u201348 (2005)","journal-title":"Modern Comput. Prof."},{"key":"7_CR7","unstructured":"Bin, L.: The research and implement on software activity analysis system based on Android sandbox, Beijing University of Posts and Telecommunications (2012)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Zheng, M., Sun, M., Lui, J.C.S.: DroidTrace: a ptrace based Android dynamic analysis system with forward execution capability. In: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 128\u2013133 (2014)","DOI":"10.1109\/IWCMC.2014.6906344"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Feng, X., Lin, J., Jia, S.: The research on security reinforcement of Android applications. In: 2015 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering. Atlantis Press (2015)","DOI":"10.2991\/icmmcce-15.2015.18"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42108-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:35:23Z","timestamp":1498311323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42108-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319421070","9783319421087"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42108-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}