{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:36:35Z","timestamp":1725730595890},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389078"},{"type":"electronic","value":"9783642389085"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38908-5_13","type":"book-chapter","created":{"date-parts":[[2013,6,9]],"date-time":"2013-06-09T22:18:23Z","timestamp":1370816303000},"page":"169-186","source":"Crossref","is-referenced-by-count":53,"title":["A Framework for Evaluating Mobile App Repackaging Detection Algorithms"],"prefix":"10.1007","author":[{"given":"Heqing","family":"Huang","sequence":"first","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Android Apktool: A tool for reengineering android apk files, \n                    \n                      http:\/\/code.google.com\/p\/android-apktool\/"},{"key":"13_CR2","unstructured":"Dalvik virtual machine: code and documentation, \n                    \n                      http:\/\/code.google.com\/p\/dalvik\/"},{"key":"13_CR3","unstructured":"Dasho, preemptive solutions, \n                    \n                      http:\/\/www.preemptive.com\/products\/dasho"},{"key":"13_CR4","unstructured":"Dex2jar, \n                    \n                      http:\/\/code.google.com\/p\/dex2jar\/"},{"key":"13_CR5","unstructured":"Dexguard, \n                    \n                      http:\/\/www.saikoa.com\/dexguard"},{"key":"13_CR6","unstructured":"Dexobf, \n                    \n                      http:\/\/dexlabs.org\/blog\/bytecode-obfuscation"},{"key":"13_CR7","unstructured":"Dx tool source code, \n                    \n                      http:\/\/grepcode.com\/file\/repository.grepcode.com\/java\/ext\/com.google.android\/android\/4.1.2_r1\/com\/android\/dx\/ssa\/"},{"key":"13_CR8","unstructured":"Gartner says android to command nearly half of worldwide smartphone operating system market by year-end 2012, \n                    \n                      http:\/\/www.gartner.com\/it\/page.jsp?id=1622614"},{"key":"13_CR9","unstructured":"Klassmaster, \n                    \n                      http:\/\/www.zelix.com\/klassmaster\/docs\/index.html"},{"key":"13_CR10","unstructured":"Oracle Virtual Machine, \n                    \n                      https:\/\/wikis.oracle.com\/display\/MaxineVM\/Home\/"},{"key":"13_CR11","unstructured":"ProGuard, \n                    \n                      http:\/\/proguard.sourceforge.net\/"},{"key":"13_CR12","unstructured":"Smali\/Baksmali, \n                    \n                      http:\/\/code.google.com\/p\/smali\/"},{"key":"13_CR13","unstructured":"Soot: a Java optimization framework, \n                    \n                      http:\/\/www.sable.mcgill.ca\/soot\/"},{"key":"13_CR14","unstructured":"Wala, \n                    \n                      http:\/\/wala.sourceforge.net\/wiki\/index.php\/"},{"key":"13_CR15","unstructured":"Byte code engineering library (bcel), \n                    \n                      http:\/\/sourceforge.net\/projects\/javaclass\/"},{"key":"13_CR16","first-page":"39","volume-title":"Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008","author":"M. Ceccato","year":"2008","unstructured":"Ceccato, M., Di Penta, M., Nagra, J., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: Towards experimental evaluation of code obfuscation techniques. In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, pp. 39\u201346. ACM, New York (2008), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/1456362.1456371"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSECP.2003.1219058","volume":"1","author":"C. Collberg","year":"2003","unstructured":"Collberg, C., Myles, G., Huntwork, A.: Sandmarks a tool for software protection research. IEEE Security and Privacy\u00a01(4), 40\u201349 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"13_CR18","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report (1997)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-33167-1_3","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J. Crussell","year":"2012","unstructured":"Crussell, J., Gibler, C., Chen, H.: Attack of the clones: Detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 37\u201354. Springer, Heidelberg (2012)"},{"key":"13_CR20","unstructured":"Desnos, A., Gueguen, G.: Android: From reversing to decompilation. In: Black Hat 2011, Abu Dhabi (2011)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Jhi, Y.-C., Wang, X., Jia, X., Zhu, S., Liu, P., Wu, D.: Value-based program characterization and its application to software plagiarism detection. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 756\u2013765. ACM (2011)","DOI":"10.1145\/1985793.1985899"},{"key":"13_CR22","unstructured":"Karnick, M., Macbride, J., Mcginnis, S., Tang, Y., Ramach, R.: A qualitative analysis of Java obfuscation"},{"key":"13_CR23","unstructured":"Li, S.: Juxtapp: A scalable system for detecting code reuse among android applications. Master\u2019s thesis, EECS Department, University of California, Berkeley (May 2012), \n                    \n                      http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2012\/EECS-2012-111.html"},{"key":"13_CR24","unstructured":"Octeau, D., Enck, W., McDaniel, P.: The ded Decompiler. Technical Report NAS-TR-0140-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (September 2010), \n                    \n                      http:\/\/siis.cse.psu.edu\/ded\/papers\/NAS-TR-0140-2010.pdf"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Octeau, D., Jha, S., McDaniel, P.: Retargeting Android Applications to Java Bytecode. In: Proceedings of the 20th International Symposium on the Foundations of Software Engineering (November 2012), \n                    \n                      http:\/\/siis.cse.psu.edu\/dare\/papers\/octeau-fse12.pdf","DOI":"10.1145\/2393596.2393600"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Wang, X., Jhi, Y.-C., Zhu, S., Liu, P.: Detecting software theft via system call based birthmarks. In: Annual Computer Security Applications Conference, ACSAC 2009, pp. 149\u2013158. IEEE (2009)","DOI":"10.1109\/ACSAC.2009.24"},{"key":"13_CR27","unstructured":"Xu, R., Sa\u0131di, H., Anderson, R.: Aurasium: Practical policy enforcement for android applications. In: Proceedings of the 21st USENIX Conference on Security (2012)"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: A brief survey. In: Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"key":"13_CR29","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1145\/2133601.2133640","volume-title":"Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012","author":"W. Zhou","year":"2012","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, pp. 317\u2013326. ACM, New York (2012)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, SP, pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38908-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T20:32:41Z","timestamp":1557779561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38908-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389078","9783642389085"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38908-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}