{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:34:09Z","timestamp":1769729649074,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,20]],"date-time":"2016-08-20T00:00:00Z","timestamp":1471651200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003407","name":"MIUR","doi-asserted-by":"crossref","award":["RBFR13AJFT 002"],"award-info":[{"award-number":["RBFR13AJFT 002"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11416-016-0282-2","type":"journal-article","created":{"date-parts":[[2016,8,20]],"date-time":"2016-08-20T05:40:56Z","timestamp":1471671656000},"page":"209-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology"],"prefix":"10.1007","volume":"13","author":[{"given":"Mila Dalla","family":"Preda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1073-8036","authenticated-orcid":false,"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,20]]},"reference":[{"key":"282_CR1","unstructured":"Antiy. http:\/\/www.antiy.net . Accessed 15 July 2016"},{"key":"282_CR2","unstructured":"Dalvik bytecode verifier notes. http:\/\/www.netmite.com\/android\/mydroid\/dalvik\/docs\/verifier.html . Accessed 15 July 2016"},{"key":"282_CR3","unstructured":"Contagio mobile e mobile malware mini dump. http:\/\/contagiominidump.blogspot.com\/ . Accessed 15 July 2016"},{"key":"282_CR4","unstructured":"Dexguard. http:\/\/www.saikoa.com\/dexguard . Accessed 15 July 2016"},{"key":"282_CR5","unstructured":"Virustotal. https:\/\/www.virustotal.com . Accessed 15 July 2016"},{"key":"282_CR6","unstructured":"Smartphone os market share, q2 2015, 2015. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp . Accessed 15 July 2016"},{"key":"282_CR7","unstructured":"Apvrille, A., Nigam, R.: Obfuscation in android malware, and how to fight back. In: Virus, Bulletin, pp. 1\u201310 (2014)"},{"key":"282_CR8","doi-asserted-by":"crossref","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., and Yang, K.: On the (im)possibility of obfuscating programs. In: CRYPTO \u201901: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 1\u201318. Springer, Berlin (2001) (ISBN 3-540-42456-3)","DOI":"10.1007\/3-540-44647-8_1"},{"key":"282_CR9","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S.: Testing malware detectors. In: Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA\u00a0\u201904), pp. 34\u201344 (2004)","DOI":"10.1145\/1007512.1007518"},{"key":"282_CR10","unstructured":"Collberg, C., and Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional, Menlo Park (2009) (ISBN 0321549252)"},{"key":"282_CR11","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.D., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of Conference Record of the 25st ACM Symp. on Principles of Programming Languages (POPL\u00a0\u201998), pp. 184\u2013196. ACM Press, New york (1998)","DOI":"10.1145\/268946.268962"},{"issue":"6","key":"282_CR12","doi-asserted-by":"crossref","first-page":"855","DOI":"10.3233\/JCS-2009-0345","volume":"17","author":"Mila Dalla Preda","year":"2009","unstructured":"Preda, Mila Dalla, Giacobazzi, Roberto: Semantics-based code obfuscation by abstract interpretation. J. Comput. Secur. 17(6), 855\u2013908 (2009)","journal-title":"J. Comput. Secur."},{"key":"282_CR13","doi-asserted-by":"crossref","unstructured":"Preda, M.D., Mastroeni, I., Giacobazzi, R.: A formal framework for property-driven obfuscation strategies. In: Fundamentals of computation theory\u201419th International Symposium, FCT 2013, Liverpool, UK, August 19-21, 2013. Proceedings, vol. 8070 of Lecture Notes in Computer Science, pp. 133\u2013144. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40164-0_15"},{"key":"282_CR14","unstructured":"F-Secure. H2 2013 threat report. Technical report (2014)"},{"key":"282_CR15","doi-asserted-by":"crossref","unstructured":"Freiling, F.C., Protsenko, M., Zhuang, Y.: An empirical evaluation of software obfuscation techniques applied to android apks. In: International Conference on Security and Privacy in Communication Networks\u201410th International ICST Conference, SecureComm 2014, Beijing, China, 24\u201326 Sept 2014, Revised Selected Papers, Part II, vol. 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 315\u2013328. Springer, Berlin (2014)","DOI":"10.1007\/978-3-319-23802-9_24"},{"key":"282_CR16","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, 26\u201329 Oct 2013, Berkeley, CA, USA, pp. 40\u201349. IEEE Computer Society (2013)","DOI":"10.1109\/FOCS.2013.13"},{"key":"282_CR17","unstructured":"Fedler, R., Schette, J., Kulicke, M.: On the effectiveness of malware protection on android: an evaluation of android antivirus app. Technical report (2013)"},{"key":"282_CR18","unstructured":"Sridhara, S.M., Stamp, M.: Metamorphic worm that carries its own morphing engine. J. Comput. Virol. 9(2), 49\u201358 (2013)"},{"key":"282_CR19","doi-asserted-by":"publisher","unstructured":"Maggi, F., Valdi, A., Zanero, S.: AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors. In: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM \u201913, pp. 49\u201354. ACM. ISBN 978-1-4503-2491-5. doi: 10.1145\/2516760.2516768 . http:\/\/doi.acm.org\/10.1145\/2516760.2516768 . Accessed 15 July 2016","DOI":"10.1145\/2516760.2516768"},{"key":"282_CR20","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.cose.2015.02.007","volume":"51","author":"Davide Maiorca","year":"2015","unstructured":"Maiorca, Davide, Ariu, Davide, Corona, Igino, Aresu, Marco, Giacinto, Giorgio: Stealth attacks: an extended insight into the obfuscation effects on android malware. Comput. & Secur. 51, 16\u201331 (2015)","journal-title":"Comput. & Secur."},{"issue":"2","key":"282_CR21","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11416-014-0225-8","volume":"11","author":"Mangesh Musale","year":"2015","unstructured":"Musale, Mangesh, Austin, Thomas H., Stamp, Mark: Hunting for metamorphic javascript malware. J. Comput. Virol. Hacking Tech. 11(2), 89\u2013102 (2015). doi: 10.1007\/s11416-014-0225-8","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"282_CR22","unstructured":"Pellegatta, F., Maggi, F., Preda, M.D.: Aamo: another android malware obfuscator (source code). https:\/\/github.com\/necst\/aamo . Accessed 15 July 2016"},{"key":"282_CR23","doi-asserted-by":"crossref","unstructured":"Protsenko, M., M\u00fcller, T.: PANDORA applies non-deterministic obfuscation randomly to android. In: 8th International Conference on Malicious and Unwanted Software: \u201cThe Americas\u201d\u2019, MALWARE 2013, Fajardo, PR, USA, Oct 22\u201324, 2013, pp. 59\u201367. IEEE Computer Society (2013)","DOI":"10.1109\/MALWARE.2013.6703686"},{"key":"282_CR24","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201913, Hangzhou, China, ACM, May 08-10, 2013, pp. 329\u2013334 (2013)","DOI":"10.1145\/2484313.2484355"},{"key":"282_CR25","unstructured":"Strazzere, T., Sawyer, J.: Android hacker protection level 0. Defcon 22, Las Vegas (2014)"},{"key":"282_CR26","unstructured":"Symantec Corporation. Internet security threat report: 20 April 2015"},{"key":"282_CR27","unstructured":"Unuchek, R., Chebyshev, V.: Mobile malware evolution: 2013. https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/58335\/mobile-malware-evolution-2013\/ . Feb 2014"},{"key":"282_CR28","unstructured":"Zheng, M., Lee, P.P.C., Lui, J.C.S.: Adam: an automatic and extensible platform to stress test android anti-virus systems (source code). http:\/\/ansrlab.cse.cuhk.edu.hk\/software\/adam\/ . Accessed 15 July 2016"},{"key":"282_CR29","unstructured":"Zheng, M., Lee, P.P.C., Lui, J.C.S.: ADAM: an automatic and extensible platform to stress test android anti-virus systems. In: Detection of Intrusions and Malware, and Vulnerability Assessment\u20149th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26\u201327, 2012, Revised Selected Papers, volume 7591 of Lecture Notes in Computer Science, pp. 82\u2013101. Springer, Berlin (2012)"},{"key":"282_CR30","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy. http:\/\/www.malgenomeproject.org\/ . Accessed 15 July 2016"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-016-0282-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0282-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0282-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0282-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T16:26:33Z","timestamp":1568305593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-016-0282-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,20]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["282"],"URL":"https:\/\/doi.org\/10.1007\/s11416-016-0282-2","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,20]]}}}