{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T05:51:29Z","timestamp":1775022689585,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/rait.2018.8388984","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T15:25:44Z","timestamp":1529940344000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Detection of repackaged Android applications based on Apps Permissions"],"prefix":"10.1109","author":[{"given":"O. S. Jannath","family":"Nisha","sequence":"first","affiliation":[]},{"given":"S. Mary Saira","family":"Bhanu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"62","article-title":"Juxtapp: A scalable system for detecting code reuse among android applications","author":"hanna","year":"2012","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1145\/2133601.2133640","article-title":"Detecting repackaged smart-phone applications in third-party android marketplaces","author":"zhou","year":"2012","journal-title":"Proceedings of the Second ACM Conference on Data and Application Security and Privacy"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435378"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642977"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref18","year":"0","journal-title":"Apktool"},{"key":"ref19","year":"0","journal-title":"Smali"},{"key":"ref4","author":"developers","year":"2014","journal-title":"Android Security Overview"},{"key":"ref3","year":"0","journal-title":"VirusTotal"},{"key":"ref6","first-page":"3","article-title":"A survey of android security threats and defenses","volume":"6","author":"rashidi","year":"2015","journal-title":"]oWUA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref2","year":"0","journal-title":"G bouncer"},{"key":"ref1","first-page":"2","article-title":"A study of android application security","volume":"2","author":"enck","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"ref20","year":"0","journal-title":"Signs"},{"key":"ref21","first-page":"153","author":"desnos","year":"2013","journal-title":"Androguard Reverse engineering Malware and goodware analysis of Android applications"}],"event":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","location":"Dhanbad","start":{"date-parts":[[2018,3,15]]},"end":{"date-parts":[[2018,3,17]]}},"container-title":["2018 4th International Conference on Recent Advances in Information Technology (RAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376941\/8388962\/08388984.pdf?arnumber=8388984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T06:09:12Z","timestamp":1693721352000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8388984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/rait.2018.8388984","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}