{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:58:07Z","timestamp":1752361087130,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,23]],"date-time":"2012-10-23T00:00:00Z","timestamp":1350950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,23]]},"DOI":"10.1145\/2401603.2401674","type":"proceedings-article","created":{"date-parts":[[2012,11,27]],"date-time":"2012-11-27T14:28:59Z","timestamp":1354026539000},"page":"328-332","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An anti-piracy mechanism based on class separation and dynamic loading for Android applications"],"prefix":"10.1145","author":[{"given":"Youn-Sik","family":"Jeong","sequence":"first","affiliation":[{"name":"Dankook University, Gyeonggi, Korea"}]},{"given":"Yeong-Ung","family":"Park","sequence":"additional","affiliation":[{"name":"Dankook University, Gyeonggi, Korea"}]},{"given":"Jae-Chan","family":"Moon","sequence":"additional","affiliation":[{"name":"Dankook University, Gyeonggi, Korea"}]},{"given":"Seong-Je","family":"Cho","sequence":"additional","affiliation":[{"name":"Dankook University, Gyeonggi, Korea"}]},{"given":"Dongjin","family":"Kim","sequence":"additional","affiliation":[{"name":"Dankook University, Gyeonggi, Korea"}]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[{"name":"Konkuk University, Chungbuk, Korea"}]}],"member":"320","published-online":{"date-parts":[[2012,10,23]]},"reference":[{"volume-title":"Aug., 2010, \"http:\/\/keyeslabs.com\/joomla\/projects\/auto-app-licensing\/152-a-global-piracy-heat-map\"","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Google LVL home page http:\/\/developer.android.com\/guide\/google\/play\/licensing\/licensing-reference.html(7)  Google LVL home page http:\/\/developer.android.com\/guide\/google\/play\/licensing\/licensing-reference.html(7)"},{"key":"e_1_3_2_1_3_1","first-page":"2","article-title":"Protection Framework for Android Applications by Encrypting DEX files","author":"Kim H.","year":"2011","journal-title":"M. S. Thesis, Dept. of Electronics and Computer Engineering, Hanyang University"},{"issue":"1","key":"e_1_3_2_1_4_1","article-title":"Copy Protection System for Android using Public Key Infrastructure","volume":"9","author":"Kim S.","year":"2012","journal-title":"Journal of Security Engineering"},{"issue":"2","key":"e_1_3_2_1_5_1","article-title":"Blocking Pirated Android App Execution using Class Separation and Dynamic Loading","volume":"7","author":"Moon J.","year":"2011","journal-title":"The Journal of The Korea Software Assessment and Valuation Society"},{"key":"e_1_3_2_1_6_1","first-page":"435","volume-title":"Proc. of KSII 2010 Summer Conference","author":"Hong S.","year":"2010"},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/www.androidpolice.com\/2010\/08\/23\/exclusive-report-googles-android-market-license-verification-easily-circumvented-will-not-stop-pirates\/(15)  http:\/\/www.androidpolice.com\/2010\/08\/23\/exclusive-report-googles-android-market-license-verification-easily-circumvented-will-not-stop-pirates\/(15)"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"19","article-title":"CryptoNET: Software Protection and Secure Execution Environment","volume":"10","author":"Ghafoor A.","year":"2010","journal-title":"International Journal of Computer Science and Network Security"}],"event":{"name":"RACS '12: Research in Applied Computation Symposium","sponsor":["ACCT Association of Convergent Computing Technology","SIGAPP ACM Special Interest Group on Applied Computing"],"location":"San Antonio Texas","acronym":"RACS '12"},"container-title":["Proceedings of the 2012 ACM Research in Applied Computation Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2401603.2401674","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2401603.2401674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:27Z","timestamp":1750277667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2401603.2401674"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,23]]},"references-count":9,"alternative-id":["10.1145\/2401603.2401674","10.1145\/2401603"],"URL":"https:\/\/doi.org\/10.1145\/2401603.2401674","relation":{},"subject":[],"published":{"date-parts":[[2012,10,23]]},"assertion":[{"value":"2012-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}