{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:03:51Z","timestamp":1775016231747,"version":"3.50.1"},"reference-count":63,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/saner.2018.8330204","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T04:41:53Z","timestamp":1522989713000},"page":"141-152","source":"Crossref","is-referenced-by-count":62,"title":["Detecting third-party libraries in Android applications with high precision and recall"],"prefix":"10.1109","author":[{"given":"Yuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jiarun","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Xiaohan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sirong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhemin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503721"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985468"},{"key":"ref32","article-title":"Attack of the clones: Detecting cloned applications on android markets","author":"crussell","year":"2012","journal-title":"Proc European Symp Research in Computer Security (ESORICS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2381212"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046739"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597109"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","article-title":"Juxtapp: A scalable system for detecting code reuse among android applications","author":"hanna","year":"2013","journal-title":"Proceedings of the 5th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment Ser DIMVA '08"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906413"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/2568225.2568286","article-title":"Achieving accuracy and scalability simultaneously in detecting application clones on android markets","author":"chen","year":"2014","journal-title":"Proceedings of the 36th International Conference on Software Engineering Ser ICSE 2014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref29","first-page":"659","article-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale","author":"chen","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium ser SEC'15"},{"key":"ref2","year":"0","journal-title":"Allatori java obfuscator"},{"key":"ref1","year":"0","journal-title":"360 app market"},{"key":"ref20","year":"0","journal-title":"ProGuard Java obfuscator"},{"key":"ref22","year":"0","journal-title":"Retrofit jackson converter"},{"key":"ref21","year":"0","journal-title":"Retrofit gson converter"},{"key":"ref24","year":"0","journal-title":"Stringer java obfuscator"},{"key":"ref23","year":"0","journal-title":"Source code for libscout"},{"key":"ref26","year":"0","journal-title":"Warning 18 000 android apps contains code that spy on your text messages"},{"key":"ref25","year":"0","journal-title":"Tencent app market"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.25"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1145\/2627393.2627396","article-title":"Nativeguard: Protecting android applications from third-party native libraries","author":"sun","year":"2014","journal-title":"Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks ser WiSec '14"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557558"},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-28865-9_1","article-title":"Finedroid: Enforcing permissions with system-wide application execution context","author":"zhang","year":"2015","journal-title":"Proc Int Conf Security Privacy Commun Netw (Securecomm)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2627393.2627395","article-title":"Viewdroid: Towards obfuscation-resilient mobile application repackaging detection","author":"zhang","year":"2014","journal-title":"Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless Mobile Networks ser WiSec '14"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557560"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/2771783.2771795","article-title":"Wukong: A scalable and accurate two-phase approach to android app clone detection","author":"wang","year":"2015","journal-title":"Proceedings of the 2015 International Symposium on Software Testing and Analysis ser ISSTA 2015"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-642-36516-4_7","article-title":"Understanding mobile app usage patterns using in-app advertisements","author":"tongaonkar","year":"2013","journal-title":"Proceedings of the 14th International Conference on Passive and Active Measurement Ser PAM'13"},{"key":"ref10","year":"0","journal-title":"Dexlib2 in smali\/baksmali"},{"key":"ref11","year":"0","journal-title":"Dexprotector android obfuscator"},{"key":"ref40","first-page":"653","article-title":"Libradar: Fast and accurate detection of third-party libraries in android apps","author":"ma","year":"2016","journal-title":"Proceedings of the 38th International Conference on Software Engineering Companion ser ICSE '16"},{"key":"ref12","year":"0","journal-title":"F-droid Free and open source android app repository"},{"key":"ref13","year":"0","journal-title":"Facebook sdk vulnerability puts millions of smartphone users' accounts at risk"},{"key":"ref14","year":"0","journal-title":"Github"},{"key":"ref15","year":"0","journal-title":"Github android libraries top 100"},{"key":"ref16","year":"0","journal-title":"Google Play Market"},{"key":"ref17","year":"0","journal-title":"Ibm discloses vulnerability in dropbox's android sdk"},{"key":"ref18","year":"0","journal-title":"Introduction to proguard"},{"key":"ref19","year":"0","journal-title":"Maven Central Repository"},{"key":"ref4","year":"0","journal-title":"Backdoor in baidu android sdk puts 100 million devices at risk"},{"key":"ref3","year":"0","journal-title":"Awesome android"},{"key":"ref6","year":"0","journal-title":"BitBucket"},{"key":"ref5","year":"0","journal-title":"Baidu app market"},{"key":"ref8","year":"0","journal-title":"Dex bytecode format"},{"key":"ref7","year":"0","journal-title":"Dasho java obfuscator"},{"key":"ref49","first-page":"28","article-title":"Adsplit: Separating smartphone advertising from applications","author":"shekhar","year":"2012","journal-title":"Proceedings of the 21st USENIX Conference on Security Symposium Ser Security'12"},{"key":"ref9","year":"0","journal-title":"Dexguard android obfuscator"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23485","article-title":"FlexDroid: Enforcing In-App Privilege Separation in Android","author":"seo","year":"2016","journal-title":"Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"ref45","first-page":"1","article-title":"Unpacking virtualization obfuscators","author":"rolles","year":"2009","journal-title":"Proceedings of the 3rd USENIX Conference on Offensive Technologies Ser WOOT'09"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664275"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227178"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23066","article-title":"Harvesting runtime values in android applications that feature anti-analysis techniques","author":"rasthofer","year":"2016","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/2414456.2414498","article-title":"Addroid: Privilege separation for applications and advertisers in android","author":"pearce","year":"2012","journal-title":"Proceedings of the 7th ACM Symposium on Information Computer and Communications Security Ser ASIACCS '12"}],"event":{"name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"Campobasso","start":{"date-parts":[[2018,3,20]]},"end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326467\/8330182\/08330204.pdf?arnumber=8330204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T19:48:10Z","timestamp":1720208890000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8330204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/saner.2018.8330204","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}