{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:07:38Z","timestamp":1772042858324,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,6,14]],"date-time":"2013-06-14T00:00:00Z","timestamp":1371168000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s11277-013-1258-x","type":"journal-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T09:54:40Z","timestamp":1371117280000},"page":"1421-1437","source":"Crossref","is-referenced-by-count":57,"title":["Repackaging Attack on Android Banking Applications and Its Countermeasures"],"prefix":"10.1007","volume":"73","author":[{"given":"Jin-Hyuk","family":"Jung","sequence":"first","affiliation":[]},{"given":"Ju Young","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyeong-Chan","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jeong Hyun","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,14]]},"reference":[{"key":"1258_CR1","unstructured":"Android, A. P. K. http:\/\/developer.android.com\/guide\/market\/expansion-files.html ."},{"key":"1258_CR2","unstructured":"Android Developers SDK. http:\/\/developer.android.com\/sdk\/ ."},{"issue":"1","key":"1258_CR3","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/PREACCEPT-1253053215890607","volume":"2","author":"J Bringer","year":"2012","unstructured":"Bringer, J., & Chabanne, H. (2012). Embedding edit distance to enable private keyword search. Human-centric Computing and Information Sciences, 2(1), 2.","journal-title":"Human-centric Computing and Information Sciences"},{"key":"1258_CR4","unstructured":"Dalvik VM Bytecode. http:\/\/source.android.com\/tech\/dalvik\/instruction-formats.html ."},{"key":"1258_CR5","unstructured":"Dex2jar. http:\/\/code.google.com\/p\/dex2jar\/ ."},{"key":"1258_CR6","volume-title":"Reversing: Secrets of reverse engineering","author":"E Eilam","year":"2011","unstructured":"Eilam, E. (2011). Reversing: Secrets of reverse engineering. New York: Wiley."},{"key":"1258_CR7","unstructured":"Enck, W., Octeau, D., McDaniel, P., & Chaudhuri, S. (2011). A Study of android application security. In: Proceedings of the 20th USENIX security, symposium, pp. 21\u201321."},{"key":"1258_CR8","unstructured":"Jarsigner. http:\/\/docs.oracle.com\/javase\/1.3\/docs\/tooldocs\/win32\/jarsigner.html ."},{"key":"1258_CR9","unstructured":"Lee, H. C., Jung, J. H., & Yi, J. H. Multi-signature based integrity checking scheme for detecting modified applications on android. Information Journal (To appear)."},{"issue":"1","key":"1258_CR10","first-page":"61","volume":"2","author":"T Li","year":"2010","unstructured":"Li, T., Yu, F., Lin, Y., Kong, X., & Yu, Y. (2010). Trusted computing dynamic attestation using a static analysis based behaviour model. Journal of Convergence, 2(1), 61\u201368.","journal-title":"Journal of Convergence"},{"key":"1258_CR11","unstructured":"Logcat. http:\/\/developer.android.com\/guide\/developing\/tools\/logcat.html ."},{"issue":"1","key":"1258_CR12","first-page":"1","volume":"2","author":"S Malakuti","year":"2011","unstructured":"Malakuti, S., Aksit, M., & Bockisch, C. (2011). Runtime verification in distributed computing. Journal of Convergence, 2(1), 1\u201310.","journal-title":"Journal of Convergence"},{"key":"1258_CR13","unstructured":"Miecznikowski, J., & Hendren, L. (2002). Decompiling java bytecode: Problems, traps and pitfalls. In: R. Nigel Horspool (Ed.), Compiler construction, (pp. 153\u2013184). Berlin: Springer."},{"key":"1258_CR14","unstructured":"Proguard. http:\/\/proguard.sourceforge.net\/ ."},{"key":"1258_CR15","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Google android: A comprehensive security assessment. IEEE Security and Privacy, 8(2), 35\u201344.","DOI":"10.1109\/MSP.2010.2"},{"key":"1258_CR16","unstructured":"An Assembler(smali) and disassembler(baksmali) for androids dex format. http:\/\/code.google.com\/p\/smali\/ ."},{"key":"1258_CR17","unstructured":"Trusted Computing Group (TCG). (2011). TPM main specification level 2 spec. ver. 1.2, Rev. 16."},{"issue":"1","key":"1258_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2192-1962-1-4","volume":"1","author":"FH Tseng","year":"2011","unstructured":"Tseng, F. H., Chou, L. D., & Chao, H. C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric Computing and Information Sciences, 1(1), 1\u201316.","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"1258_CR19","unstructured":"UNDX. http:\/\/sourceforge.net\/projects\/undx\/ ."},{"key":"1258_CR20","unstructured":"Vidas, T., Votipka, D., & Christin, N. (2011). All your droid are belong to Us: A survey of current android attacks. In: Proceedings of the 5th USENIX workshop on offensive technologies, pp. 10\u201310."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1258-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1258-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1258-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T23:15:17Z","timestamp":1553642117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1258-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,14]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["1258"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1258-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,14]]}}}