{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:34:40Z","timestamp":1740141280611,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFB0802203","2018YFB1003701"],"award-info":[{"award-number":["2017YFB0802203","2018YFB1003701"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61825203","U1736203","61732021"],"award-info":[{"award-number":["61825203","U1736203","61732021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve","award":["2016B010124009","2017B010124002"],"award-info":[{"award-number":["2016B010124009","2017B010124002"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877029"],"award-info":[{"award-number":["61877029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802145","61872153"],"award-info":[{"award-number":["61802145","61872153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872153"],"award-info":[{"award-number":["61872153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11871248","U1636209"],"award-info":[{"award-number":["11871248","U1636209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702222"],"award-info":[{"award-number":["61702222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M612842"],"award-info":[{"award-number":["2017M612842"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postdoctoral Foundation of Jinan University, Science and Technology Program of Guangzhou of China","award":["201802010061"],"award-info":[{"award-number":["201802010061"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/tdsc.2019.2914202","type":"journal-article","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T20:29:59Z","timestamp":1556656199000},"page":"652-666","source":"Crossref","is-referenced-by-count":4,"title":["Looking Back! Using Early Versions of Android Apps as Attack Vectors"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7786-0231","authenticated-orcid":false,"given":"Yue","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5876-7875","authenticated-orcid":false,"given":"Jiasi","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Hou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7958-6571","authenticated-orcid":false,"given":"Anjia","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0874-5010","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3491-8146","authenticated-orcid":false,"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.85"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.18"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_10"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref37","first-page":"35","article-title":"DREBIN: Effective and explainable detection of android malware in your pocket","author":"arp","year":"2018","journal-title":"Proc 21st Annu Netw Distrib Syst Secur Symp"},{"key":"ref36","first-page":"160","article-title":"UI ripping in android: Reverse engineering of graphical user interfaces and its application","author":"yang","year":"2015","journal-title":"Proc IEEE Conf Collaboration Internet Comput"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843866"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"year":"2018","key":"ref28","article-title":"The UptoDown market"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572559"},{"year":"2018","key":"ref2","article-title":"Number of available applications in the Google Play store from december 2009 to december 2018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.1"},{"year":"0","key":"ref20","article-title":"Weibo reaches 100 million daily users."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.230"},{"article-title":"Number of Facebook users worldwide 2008&#x2013;2016.","year":"0","author":"portal","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70104-6"},{"key":"ref26","article-title":"The camel case","volume":"56","author":"williams","year":"1940","journal-title":"Law Quart Rev"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771800"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818033"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/581376.581377"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972794"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"journal-title":"Essential JNI Java Native Interface","year":"1998","author":"gordon","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997436"},{"year":"2018","key":"ref12","article-title":"The early versions of Facebook"},{"year":"2018","key":"ref13","article-title":"RESTful API tutorial"},{"key":"ref14","article-title":"Android reverse engineering","author":"cannon","year":"2010","journal-title":"Thomas Cannon"},{"article-title":"Android reverse engineering tools","year":"2012","author":"apvrille","key":"ref15"},{"article-title":"Dex2Jar: Tools to work with android .Dex and Java .Class files.","year":"2010","author":"alll","key":"ref16"},{"key":"ref17","first-page":"2","article-title":"Analyzing competition among internet players: Qihoo 360 v. tencent","volume":"12","author":"evans","year":"2013","journal-title":"CPI Antitrust Chronicle"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1049\/el:19990623","article-title":"secure agreement scheme for g\/sup xy\/ via password authentication","volume":"35","author":"kwon","year":"1999","journal-title":"Electronics Letters"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref4","first-page":"28","article-title":"Man-in-the-middle in tunnelled authentication protocols","author":"asokan","year":"2003","journal-title":"Proc 11th Int Workshop Secur Protocols"},{"article-title":"App download and usage statistics (2018).","year":"0","author":"portal","key":"ref3"},{"key":"ref6","article-title":"Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage","author":"yang","year":"2018","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2905522"},{"key":"ref8","volume":"1","author":"rescorla","year":"2001","journal-title":"SSL and TLS Designing and Building Secure Systems"},{"key":"ref7","first-page":"21","article-title":"Beginners guide to reverse engineering android apps","author":"fora","year":"2014","journal-title":"Proc RSA Conf"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898389"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2880238"},{"key":"ref46","first-page":"97","article-title":"Securing embedded user interfaces: Android and beyond","author":"roesner","year":"2013","journal-title":"Proc 22th USENIX Secur Symp"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.008"},{"key":"ref48","first-page":"977","article-title":"SUPOR: Precise and scalable sensitive user input detection for android apps","author":"huang","year":"2015","journal-title":"Proc 24th USENIX Secur Symp"},{"key":"ref47","first-page":"45","article-title":"AppSealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in android applications","author":"zhang","year":"2016","journal-title":"Proc 21st Annu Netw Distrib Syst Secur Symp"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9372344\/08703119.pdf?arnumber=8703119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:05:31Z","timestamp":1642003531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8703119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":55,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2914202","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}