{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T13:54:02Z","timestamp":1768744442035,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642372995","type":"print"},{"value":"9783642373008","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37300-8_4","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T08:53:59Z","timestamp":1363164839000},"page":"62-81","source":"Crossref","is-referenced-by-count":98,"title":["Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications"],"prefix":"10.1007","author":[{"given":"Steve","family":"Hanna","sequence":"first","affiliation":[]},{"given":"Ling","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Saung","family":"Li","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Anzhi android market, \n                    \n                      http:\/\/www.anzhi.com\/"},{"key":"4_CR2","unstructured":"Contagio malware dump, \n                    \n                      http:\/\/contagiodump.blogspot.com\/"},{"key":"4_CR3","unstructured":"Dalvik virtual machine, \n                    \n                      http:\/\/www.dalvikvm.com\/"},{"key":"4_CR4","unstructured":"Developers express concern over pirated games on android market, \n                    \n                      http:\/\/www.guardian.co.uk\/technology\/blog\/2011\/mar\/17\/android-market-pirated-games-concerns\/"},{"key":"4_CR5","unstructured":"Exercising our remote application removal feature, \n                    \n                      http:\/\/android-developers.blogspot.com\/2010\/06\/exercising-our-remote-application.html"},{"key":"4_CR6","unstructured":"Google in-app billing, \n                    \n                      http:\/\/developer.android.com\/guide\/market\/billing\/index.html"},{"key":"4_CR7","unstructured":"Google license verification library, \n                    \n                      http:\/\/developer.android.com\/guide\/publishing\/licensing.html"},{"key":"4_CR8","unstructured":"Hadoop, \n                    \n                      http:\/\/hadoop.apache.org\/"},{"key":"4_CR9","unstructured":"Hash functions, \n                    \n                      http:\/\/www.cse.yorku.ca\/~oz\/hash.html"},{"key":"4_CR10","unstructured":"In-app billing, \n                    \n                      http:\/\/developer.android.com\/guide\/market\/billing\/index.html"},{"key":"4_CR11","unstructured":"Mobile threat report, \n                    \n                      https:\/\/www.mylookout.com\/mobile-threat-report\/"},{"key":"4_CR12","unstructured":"Number of available android applications, \n                    \n                      http:\/\/www.appbrain.com\/stats\/number-of-android-apps\/"},{"key":"4_CR13","unstructured":"Proguard, \n                    \n                      http:\/\/developer.android.com\/guide\/developing\/tools\/proguard.html"},{"key":"4_CR14","unstructured":"Up to a million android users affected by malware, says report, \n                    \n                      http:\/\/www.linuxfordevices.com\/c\/a\/News\/Lookout-malware-report-2011\/"},{"key":"4_CR15","unstructured":"Update: Security alert: Droiddream malware found in official android market, \n                    \n                      http:\/\/blog.mylookout.com\/2011\/03\/security-alert-malware-found-in-official-android-market-droiddream\/"},{"key":"4_CR16","unstructured":"Freemarket: Shopping for free in android applications. Extended Abstract, to appear NDSS (2012)"},{"key":"4_CR17","unstructured":"Baker, B.S., Manber, U.: Deducing similarities in java sources from bytecodes. In: Proceedings of the USENIX Annual Technical Conference (1998)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of MobiSys (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"4_CR19","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley and Sons (2000)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of ACM CCS (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"4_CR21","first-page":"321","volume-title":"Proceedings of the 30th International Conference on Software Engineering, ICSE 2008","author":"M. Gabel","year":"2008","unstructured":"Gabel, M., Jiang, L., Su, Z.: Scalable detection of semantic clones. In: Proceedings of the 30th International Conference on Software Engineering, ICSE 2008, pp. 321\u2013330. ACM, New York (2008)"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-88625-9_16","volume-title":"Information and Communications Security","author":"D. Gao","year":"2008","unstructured":"Gao, D., Reiter, M.K., Song, D.: BinHunt: Automatically Finding Semantic Differences in Binary Programs. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 238\u2013255. Springer, Heidelberg (2008)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Hu, X., Cker Chiueh, T., Shin, K.G.: Large-scale malware indexing using function call graphs. In: Proceedings ACM CCS (2009)","DOI":"10.1145\/1653662.1653736"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Jang, J., Brumley, D., Venkataraman, S.: Bitshred: Feature hashing malware for scalable triage and semantic analysis. In: Proceedings of ACM CCS (2011)","DOI":"10.1145\/2046707.2046742"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate tree-based detection of code clones. In: Proceedings of ICSE (2007)","DOI":"10.1109\/ICSE.2007.30"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Weinberger, K., Dasgupta, A., Langford, J., Smola, A., Attenberg, J.: Feature hashing for large scale multitask learning. In: Proceedings of ICML (June 2009)","DOI":"10.1145\/1553374.1553516"},{"key":"4_CR27","first-page":"301","volume-title":"Proceeding of the 33rd International Conference on Software Engineering, ICSE 2011","author":"H. Kim","year":"2011","unstructured":"Kim, H., Jung, Y., Kim, S., Yi, K.: Mecc: memory comparison-based clone detector. In: Proceeding of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 301\u2013310. ACM, New York (2011)"},{"key":"4_CR28","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research\u00a07 (December 2006)"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Li, Z., Lu, S., Myagmar, S., Zhou, Y.: Cp-miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering 32(3) (2006)","DOI":"10.1109\/TSE.2006.28"},{"key":"4_CR30","unstructured":"Schleimer, S., Wilkerson, D., Aiken, A.: Winnowing: Local algorithms for document fingerprinting. In: Proceedings of the ACM SIGMOD\/PODS Conference"},{"key":"4_CR31","unstructured":"Shi, Q., Petterson, J., Dror, G., Langford, J., Smola, A., Strehl, A., Vishwanathan, V.: Hash kernels. In: Proceedings of AISTATS 2009 (2009)"},{"key":"4_CR32","unstructured":"Walenstein, A., Lakhotia, A.: The software similarity problem in malware analysis. In: Proceedings of Duplication, Redundancy, and Similarity in Software (2007)"},{"key":"4_CR33","unstructured":"Yarow, J., Terbush, J.: Android is totally blowing away the competition, \n                    \n                      http:\/\/www.businessinsider.com\/chart-of-the-day-android-is-taking-over-the-smartphone-market-2011-11"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Droidmoss: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (2012)","DOI":"10.1145\/2133601.2133640"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37300-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T18:44:54Z","timestamp":1557600294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37300-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372995","9783642373008"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37300-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}