{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:14:01Z","timestamp":1754396041971,"version":"3.37.3"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ShanghaiTech Start-up Research","award":["2020F0203-000-14"],"award-info":[{"award-number":["2020F0203-000-14"]}]},{"name":"Hong Kong RGC Projects","award":["152223\/17E","152239\/18E","CityU C1008-16G"],"award-info":[{"award-number":["152223\/17E","152239\/18E","CityU C1008-16G"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072046"],"award-info":[{"award-number":["62072046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang","award":["2018R01005"],"award-info":[{"award-number":["2018R01005"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["K20200019"],"award-info":[{"award-number":["K20200019"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1109\/tse.2021.3077654","type":"journal-article","created":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T22:10:12Z","timestamp":1620252612000},"page":"3044-3065","source":"Crossref","is-referenced-by-count":6,"title":["A Systematical Study on Application Performance Management Libraries for Apps"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5677-4564","authenticated-orcid":false,"given":"Yutian","family":"Tang","sequence":"first","affiliation":[{"name":"ShanghaiTech University, Shanghai, China"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9814-5977","authenticated-orcid":false,"given":"Xian","family":"Zhan","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7610-4736","authenticated-orcid":false,"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Engineering Laboratory of Mobile Security of Zhejiang Province, Zhejiang University, Hangzhou Shi, Zhejiang Sheng, China"}]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0551-2163","authenticated-orcid":false,"given":"Qiben","family":"Yan","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3803-9600","authenticated-orcid":false,"given":"Jacky","family":"Keung","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong SAR, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Android and google play statistics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09748-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2013.35"},{"key":"ref4","first-page":"1","article-title":"Studying the effectiveness of application performance management (APM) tools for detecting performance regressions for web applications: An experience report","volume-title":"Proc. IEEE\/ACM 13th Working Conf. Mining Softw. Repositories","author":"Ahmed"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3053674"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2668930.2688061"},{"key":"ref8","first-page":"1","article-title":"Towards model-based performance predictions of SAP enterprise applications","volume-title":"Proc. ACM\/SPEC Int. Conf. Perform. Eng.","author":"Streitz"},{"key":"ref9","first-page":"682","article-title":"Demystifying application performance management libraries for android","volume-title":"Proc. Int. Conf. Automat. Softw. Eng.","author":"Y."},{"key":"ref10","article-title":"Umeng APM"},{"key":"ref11","article-title":"Flurry"},{"key":"ref12","article-title":"CA application performance management"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664275"},{"key":"ref14","article-title":"Android library statistics"},{"key":"ref15","article-title":"Performance engineering survey: Findings from 400 dev, test, and IT ops professionals"},{"key":"ref16","article-title":"Tingyun APM"},{"key":"ref17","article-title":"Mtjbaidu APM"},{"key":"ref18","article-title":"Mobile tencent analytics APM"},{"key":"ref19","article-title":"Openinstall APM"},{"key":"ref20","article-title":"New relic APM"},{"key":"ref21","article-title":"Appdynamics APM"},{"key":"ref22","article-title":"Oneapm"},{"key":"ref23","article-title":"Growingio"},{"key":"ref24","article-title":"Google analytics for firebase"},{"key":"ref25","article-title":"Dynatrace"},{"key":"ref26","article-title":"Site24x7"},{"author":"Focus","key":"ref27","article-title":"Apppulse"},{"key":"ref28","article-title":"Apteligent"},{"key":"ref29","article-title":"Appsflyer"},{"key":"ref30","article-title":"Yandex metrica"},{"key":"ref31","article-title":"Adjust"},{"key":"ref32","article-title":"Ironsource"},{"key":"ref33","article-title":"Countly"},{"key":"ref34","article-title":"Sentry"},{"key":"ref35","article-title":"Androidgodeye"},{"key":"ref36","article-title":"Blackcancary"},{"key":"ref37","article-title":"Argusapm"},{"volume-title":"The C Programming Language","year":"1975","author":"Ritchie","key":"ref38"},{"volume-title":"GNU Scientific Library Reference Manual - Third Edition","year":"2009","author":"Gough","key":"ref39"},{"key":"ref40","article-title":"Google breadpad"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/9780470283110"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3295739"},{"volume-title":"Eclipse AspectJ: aspect-oriented programming with AspectJ and the Eclipse AspectJ development tools","year":"2004","author":"Colyer","key":"ref43"},{"volume-title":"Gradle in Action","year":"2014","author":"Muschko","key":"ref44"},{"volume-title":"Programming android","year":"2012","author":"Mednieks","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref49","first-page":"1101","article-title":"On demystifying the android application framework: Re-visiting android permission specification analysis","volume-title":"Proc. USENIX Secur. Symp.","author":"Backes"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.46"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47910-4_21"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568229"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09703-y"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180229"},{"key":"ref56","article-title":"Pkgdiff"},{"key":"ref57","first-page":"919","article-title":"Automated third-party library detection for android applications: Are we there yet?","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automat. Softw. Eng.","author":"Zhan"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597109"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2020.2996433"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_15"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00009"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693128"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"ref69","first-page":"543","article-title":"Effective inter-component communication mapping in android: An essential step towards holistic security analysis","volume-title":"Proc. USENIX Secur.","author":"Octeau"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2631949"},{"key":"ref72","first-page":"199","article-title":"Ui obfuscation and its effects on automated ui analysis for android apps","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automat. Softw. Eng.","author":"Zhou"},{"key":"ref73","article-title":"Apktool: A tool for reverse engineering android apk files"},{"key":"ref74","article-title":"Charles: Web debugging proxy application"},{"key":"ref75","article-title":"Monkey framework"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963773"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"ref80","first-page":"50","article-title":"Hey, you, get off of my market: detecting malicious apps in official and alternative android markets","volume-title":"Proc. 19th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Zhou"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656460"},{"key":"ref82","first-page":"289","article-title":"Malton: Towards on-device non-invasive mobile malware analysis for art","volume-title":"Proc. USENIX Secur. Sympo.","author":"Xue"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2886875"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808125"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2730198"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"ref88","first-page":"445","article-title":"MopEye: Opportunistic monitoring of per-app mobile network performance","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Wu"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057166"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2737990"},{"key":"ref91","first-page":"107","article-title":"AppInsight: Mobile app performance monitoring in the wild","volume-title":"Proc. 10th USENIX Conf. Operating Syst. Des. Implementation","author":"Ravindranath"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636091"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2015.7404721"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950316"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.43"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.72"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9857502\/09424465.pdf?arnumber=9424465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:28:44Z","timestamp":1725082124000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":96,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3077654","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2022,8,1]]}}}