{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:55Z","timestamp":1773510895668,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662439357","type":"print"},{"value":"9783662439364","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_9","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T08:05:04Z","timestamp":1403856304000},"page":"130-145","source":"Crossref","is-referenced-by-count":32,"title":["FSquaDRA: Fast Detection of Repackaged Applications"],"prefix":"10.1007","author":[{"given":"Yury","family":"Zhauniarovich","sequence":"first","affiliation":[]},{"given":"Olga","family":"Gadyatskaya","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"La Spina","sequence":"additional","affiliation":[]},{"given":"Ermanno","family":"Moser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"ActionBarSherlock, \n                  \n                    http:\/\/actionbarsherlock.com\/"},{"key":"9_CR2","unstructured":"AndroGuard: Reverse engineering, Malware and goodware analysis of Android applications, \n                  \n                    https:\/\/code.google.com\/p\/androguard\/"},{"key":"9_CR3","unstructured":"Android-apktool: A tool for reverse engineering Android apk files, \n                  \n                    https:\/\/code.google.com\/p\/android-apktool\/"},{"key":"9_CR4","unstructured":"Smali: An assembler\/disassembler for Android\u2019s dex format, \n                  \n                    https:\/\/code.google.com\/p\/smali\/"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1109\/TIT.2005.844059","volume":"51","author":"R. Cilibrasi","year":"2005","unstructured":"Cilibrasi, R., Vit\u00e1nyi, P.M.B.: Clustering by compression. IEEE Transactions on Information Theory\u00a051, 1523\u20131545 (2005)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-33167-1_3","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J. Crussell","year":"2012","unstructured":"Crussell, J., Gibler, C., Chen, H.: Attack of the clones: Detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 37\u201354. Springer, Heidelberg (2012)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Crussell, J., Gibler, C., Chen, H.: Scalable semantics-based detection of similar android applications. In: Proc. of Esorics 2013 (2013)","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Desnos, A.: Android: Static analysis using similarity distance. In: Proc. of HICSS 2012, pp. 5394\u20135403 (2012)","DOI":"10.1109\/HICSS.2012.114"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Gibler, C., Stevens, R., Crussell, J., Chen, H., Zang, H., Choi, H.: Adrob: examining the landscape and impact of android application plagiarism. In: Proc. of MobiSys 2013, pp. 431\u2013444 (2013)","DOI":"10.1145\/2462456.2466709"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S. Hanna","year":"2013","unstructured":"Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: A scalable system for detecting code reuse among android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol.\u00a07591, pp. 62\u201381. Springer, Heidelberg (2013)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-38908-5_13","volume-title":"Trust and Trustworthy Computing","author":"H. Huang","year":"2013","unstructured":"Huang, H., Zhu, S., Liu, P., Wu, D.: A framework for evaluating mobile app repackaging detection algorithms. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol.\u00a07904, pp. 169\u2013186. Springer, Heidelberg (2013)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-28166-2_11","volume-title":"Engineering Secure Software and Systems","author":"R. Potharaju","year":"2012","unstructured":"Potharaju, R., Newell, A., Nita-Rotaru, C., Zhang, X.: Plagiarizing smartphone applications: attack strategies and defense techniques. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol.\u00a07159, pp. 106\u2013120. Springer, Heidelberg (2012)"},{"key":"9_CR13","unstructured":"Protalinski, E.: Warning: New Android malware tricks users with real Opera Mini (July 2012), \n                  \n                    http:\/\/www.zdnet.com\/warning-new-android-malware-tricks-users-with-real-opera-mini-7000001586\/"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Vidas, T., Christin, N.: Sweetening android lemon markets: measuring and combating malware in application marketplaces. In: Proc. of CODASPY 2013, pp. 197\u2013208 (2013)","DOI":"10.1145\/2435349.2435378"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of \u201dpiggybacked\u201d mobile applications. In: Proc. of CODASPY 2013, pp. 185\u2013196 (2013)","DOI":"10.1145\/2435349.2435377"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proc. of CODASPY 2012, pp. 317\u2013326 (2012)","DOI":"10.1145\/2133601.2133640"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:56:18Z","timestamp":1558918578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}