{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:48Z","timestamp":1725902928373},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_26","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"275-285","source":"Crossref","is-referenced-by-count":0,"title":["Study on Android Native Layer Code Protection Based on Improved O-LLVM"],"prefix":"10.1007","author":[{"given":"Baojiang","family":"Cui","sequence":"first","affiliation":[]},{"given":"Qi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"26_CR1","unstructured":"Nexus Event (2015). \nhttp:\/\/www.androidcentral.com\/nexus-event"},{"key":"26_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11416-011-0157-5","volume":"8","author":"A Apvrille","year":"2012","unstructured":"Apvrille, A., Strazzere, T.: Reducing the window of opportunity for Android malware Gotta catch\u2019em all. J. Comput. Virol. 8, 1\u201311 (2012)","journal-title":"J. Comput. Virol."},{"key":"26_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/v7010001","volume":"7","author":"A Apvrille","year":"2014","unstructured":"Apvrille, A., Nigam, R.: Obfuscation in android malware, and how to fight back. Virus Bull. 7, 1\u201310 (2014)","journal-title":"Virus Bull."},{"key":"26_CR4","unstructured":"Yu, R.: Android packers: facing the challenges, building solutions. In: Proceedings of the 24th Virus Bulletin International Conference (2014)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Russello, G., Jimenez, A.B., Naderi, H., et al.: Firedroid: Hardening security in almost-stock android. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 319\u2013328. ACM (2013)","DOI":"10.1145\/2523649.2523678"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Petsas, T., Voyatzis, G., Athanasopoulos, E., et al.: Rage against the virtual machine: hindering dynamic analysis of android malware. In: Proceedings of the Seventh European Workshop on System Security, p. 5. ACM (2014)","DOI":"10.1145\/2592791.2592796"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Luo, X., Yin, H.: Dexhunter: toward extracting hidden code from packed android applications. In: European Symposium on Research in Computer Security, pp. 293\u2013311. Springer (2015)","DOI":"10.1007\/978-3-319-24177-7_15"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Xu, J., Zhang, L., Sun, Y., et al.: Toward a Secure Android Software Protection System. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), pp. 2068\u20132074 (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.307"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.: LLVM: A compilation framework for lifelong program analysis & transformation. In: Proceedings of the International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization, p. 75. IEEE Computer Society (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., et al.: Obfuscator-LLVM\u2013Software Protection for the Masses. In: 2015 IEEE\/ACM 1st International Workshop on Software Protection (SPRO), pp. 3\u20139. IEEE (2015)","DOI":"10.1109\/SPRO.2015.10"},{"key":"26_CR11","unstructured":"Installation of O-LLVM. \nhttps:\/\/github.com\/obfuscator-llvm\/obfuscator\/wiki"},{"key":"26_CR12","unstructured":"M\/o\/Vfuscator2. \nhttps:\/\/github.com\/xoreaxeaxeax\/movfuscator"},{"key":"26_CR13","unstructured":"Drape, S.: Obfuscation Of Abstract Data Types. University of Oxford (2004)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Majumdar, A., Drape, S.J., Thomborson, C.D.: Slicing obfuscations: design, correctness, and evaluation. In: Proceedings of the 2007 ACM Workshop on Digital Rights Management, pp. 70\u201381. ACM, October 2007","DOI":"10.1145\/1314276.1314290"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:13:44Z","timestamp":1499141624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}