{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:04:51Z","timestamp":1730300691057,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650141","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T21:10:38Z","timestamp":1552943438000},"page":"1075-1079","source":"Crossref","is-referenced-by-count":4,"title":["Progressive Control Flow Obfuscation for Android Applications"],"prefix":"10.1109","author":[{"given":"Li","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Huasong","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Vrizlynn L. L.","family":"Thing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"275","article-title":"Binary obfuscation using signals","author":"popov","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref11","article-title":"A taxonomy of obfuscating transformations","author":"collberg","year":"1997","journal-title":"Technical report Department of Computer Science The University of Auckland New Zealand"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/332084.332092"},{"key":"ref13","article-title":"Java control flow obfuscation","author":"low","year":"1998","journal-title":"Ph D Dissertation Citeseer"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71229-9_7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"ref17","first-page":"82","article-title":"Adam: an automatic and extensible platform to stress test android anti-virus systems","author":"zheng","year":"2012","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.003"},{"journal-title":"Android open source project - constraints","year":"0","key":"ref19"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","article-title":"Software tamper resistance: Obstructing static analysis of programs","author":"wang","year":"2000","journal-title":"Technical Report CS-2000-12 University of Virginia 12 2000 Tech Rep"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"journal-title":"App revenues","year":"2017","key":"ref2"},{"journal-title":"Gartner Says Worldwide Sales of Smartphones Recorded First Ever Decline During the Fourth Quarter of 2017","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45439-X_10"},{"key":"ref20","volume":"500","author":"watson","year":"1996","journal-title":"Structured testing A testing methodology using the cyclomatic complexity metric"},{"journal-title":"A Tool for Reverse Engineering Android Apk Files","year":"0","key":"ref21"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","start":{"date-parts":[[2018,10,28]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650141.pdf?arnumber=8650141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:38:41Z","timestamp":1598240321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650141\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650141","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}