{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:21Z","timestamp":1763468181590,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557558","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"199-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["DIVILAR"],"prefix":"10.1145","author":[{"given":"Wu","family":"Zhou","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093157.2093175"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179509.1179521"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the IEEE, 93(2), 2005","author":"Arnold M.","year":"2004","unstructured":"M. Arnold , S. J. Fink , D. Grove , M. Hind , and P. F. Sweeney . A Survey of Adaptive Optimization in Virtual Machines . In Proceedings of the IEEE, 93(2), 2005 . Special Issue on Program Generation, Optimization, and Adaptation , 2004 . M. Arnold, S. J. Fink, D. Grove, M. Hind, and P. F. Sweeney. A Survey of Adaptive Optimization in Virtual Machines. In Proceedings of the IEEE, 93(2), 2005. Special Issue on Program Generation, Optimization, and Adaptation, 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855754"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_8_1","unstructured":"A. D. Blog. Android at Google I\/O 2013: Keynote Wrapup. http:\/\/android-developers.blogspot.com\/2013\/05\/android-at-google-io-2013-keynote-wrapup.html.  A. D. Blog. Android at Google I\/O 2013: Keynote Wrapup. http:\/\/android-developers.blogspot.com\/2013\/05\/android-at-google-io-2013-keynote-wrapup.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.11.011"},{"key":"e_1_3_2_1_10_1","first-page":"133","volume-title":"Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, HOTOS '01","author":"Chen P. M.","unstructured":"P. M. Chen and B. D. Noble . When virtual is better than real . In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, HOTOS '01 , pages 133 --, Washington, DC, USA, 2001. IEEE Computer Society. P. M. Chen and B. D. Noble. When virtual is better than real. In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, HOTOS '01, pages 133--, Washington, DC, USA, 2001. IEEE Computer Society."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046739"},{"key":"e_1_3_2_1_12_1","volume-title":"Attack of the Clones: Detecting Cloned Applications on Android Markets. In 17th European Symposium on Research in Computer Security, ESORICS 2012","author":"Crussell J.","year":"2012","unstructured":"J. Crussell , C. Gibler , and H. Chen . Attack of the Clones: Detecting Cloned Applications on Android Markets. In 17th European Symposium on Research in Computer Security, ESORICS 2012 , September 2012 . J. Crussell, C. Gibler, and H. Chen. Attack of the Clones: Detecting Cloned Applications on Android Markets. In 17th European Symposium on Research in Computer Security, ESORICS 2012, September 2012."},{"key":"e_1_3_2_1_13_1","unstructured":"O. X. Developer. Mac OS X Lion Security Enhancements - Improved ASLR. http:\/\/osxdeveloper.wordpress.com\/2011\/07\/28\/mac-os-x-lion-security-enhancements-improved-aslr\/.  O. X. Developer. Mac OS X Lion Security Enhancements - Improved ASLR. http:\/\/osxdeveloper.wordpress.com\/2011\/07\/28\/mac-os-x-lion-security-enhancements-improved-aslr\/."},{"key":"e_1_3_2_1_14_1","volume-title":"http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html. Online","author":"Developers A.","year":"2013","unstructured":"A. Developers . Android NDK. http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html. Online ; accessed at June 30, 2013 . A. Developers. Android NDK. http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html. Online; accessed at June 30, 2013."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11","author":"Enck W.","year":"2011","unstructured":"W. Enck , P. Gilbert , B.-g. Chun , L. Cox , J. Jung , P. McDaniel , and A. Sheth . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11 , 2011 . W. Enck, P. Gilbert, B.-g. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI '11, 2011."},{"key":"e_1_3_2_1_16_1","unstructured":"T. A. Entrepreneur. Android App Piracy Is A Huge Problem! http:\/\/theappentrepreneur.com\/android-app-piracy-is-huge-problem.  T. A. Entrepreneur. Android App Piracy Is A Huge Problem! http:\/\/theappentrepreneur.com\/android-app-piracy-is-huge-problem."},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-642-24861-0_12","volume-title":"Multi-stage Binary Code Obfuscation Using Improved Virtual Machine","author":"Fang H.","year":"2011","unstructured":"H. Fang , Y. Wu , S. Wang , and Y. Huang . Multi-stage Binary Code Obfuscation Using Improved Virtual Machine . In X. Lai, J. Zhou, and H. Li, editors, Information Security, volume 7001 of Lecture Notes in Computer Science , pages 168 -- 181 . Springer Berlin Heidelberg , 2011 . H. Fang, Y. Wu, S. Wang, and Y. Huang. Multi-stage Binary Code Obfuscation Using Improved Virtual Machine. In X. Lai, J. Zhou, and H. Li, editors, Information Security, volume 7001 of Lecture Notes in Computer Science, pages 168--181. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/code.google.com\/p\/smali\/. Online","author":"Freke J.","year":"2013","unstructured":"J. Freke . Smali - An Assembler\/ Disassembler for Android's dex Format . http:\/\/code.google.com\/p\/smali\/. Online ; accessed at Jun 30, 2013 . J. Freke. Smali - An Assembler\/Disassembler for Android's dex Format. http:\/\/code.google.com\/p\/smali\/. Online; accessed at Jun 30, 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151051"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929304.1929307"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.53"},{"volume-title":"Smali 2 Java Conversion Tool. https:\/\/github.com\/demitsuri\/smali2java. Online","year":"2013","key":"e_1_3_2_1_24_1","unstructured":"GitHub. Smali 2 Java Conversion Tool. https:\/\/github.com\/demitsuri\/smali2java. Online ; accessed at Jun 30, 2013 . GitHub. Smali 2 Java Conversion Tool. https:\/\/github.com\/demitsuri\/smali2java. Online; accessed at Jun 30, 2013."},{"key":"e_1_3_2_1_25_1","unstructured":"R. Goodwin. WWDC 2013: Apple's App Store Numbers are Insane - 50 Billion App Downloads $10 Billion Paid to Devs. http:\/\/www.knowyourmobile.com\/apple\/20409\/wwdc-2013-apples-app-store-numbers-are-insane-50-billion-app-downloads.  R. Goodwin. WWDC 2013: Apple's App Store Numbers are Insane - 50 Billion App Downloads $10 Billion Paid to Devs. http:\/\/www.knowyourmobile.com\/apple\/20409\/wwdc-2013-apples-app-store-numbers-are-insane-50-billion-app-downloads."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic Detection of Capability Leaks in Stock Android Smartphones . In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12 , February 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_1_30_1","volume-title":"Rootkits: Subverting the Windows Kernel","author":"Hoglund G.","year":"2005","unstructured":"G. Hoglund and J. Butler . Rootkits: Subverting the Windows Kernel . Addison-Wesley Professional , 2005 . G. Hoglund and J. Butler. Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, 2005."},{"key":"e_1_3_2_1_31_1","first-page":"14","volume-title":"Proceedings of the 3rd conference on USENIX Windows NT Symposium -","volume":"3","author":"Hunt G.","year":"1999","unstructured":"G. Hunt and D. Brubacher . Detours: binary interception of win32 functions . In Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3 , WINSYM'99, pages 14 -- 14 , Berkeley, CA, USA , 1999 . USENIX Association. G. Hunt and D. Brubacher. Detours: binary interception of win32 functions. In Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3, WINSYM'99, pages 14--14, Berkeley, CA, USA, 1999. USENIX Association."},{"key":"e_1_3_2_1_32_1","unstructured":"G. Inc. Android Application Licensing. http:\/\/developer.android.com\/guide\/google\/play\/licensing\/index.html. Online; accessed at Jun 30 2013.  G. Inc. Android Application Licensing. http:\/\/developer.android.com\/guide\/google\/play\/licensing\/index.html. Online; accessed at Jun 30 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"http:\/\/developer.android.com\/tools\/help\/adb.html. Online","author":"G. Inc. Android Debug Bridge.","year":"2013","unstructured":"G. Inc. Android Debug Bridge. http:\/\/developer.android.com\/tools\/help\/adb.html. Online ; accessed at Jun 30, 2013 . G. Inc. Android Debug Bridge. http:\/\/developer.android.com\/tools\/help\/adb.html. Online; accessed at Jun 30, 2013."},{"key":"e_1_3_2_1_34_1","volume-title":"http:\/\/developer.android.com\/tools\/help\/logcat.html. Online","author":"G. Inc. Android Logcat.","year":"2013","unstructured":"G. Inc. Android Logcat. http:\/\/developer.android.com\/tools\/help\/logcat.html. Online ; accessed at Jun 30, 2013 . G. Inc. Android Logcat. http:\/\/developer.android.com\/tools\/help\/logcat.html. Online; accessed at Jun 30, 2013."},{"key":"e_1_3_2_1_35_1","unstructured":"G. Inc. The AndroidManifest.xml File. http:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro.html. Online; accessed at Jun 30 2013.  G. Inc. The AndroidManifest.xml File. http:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro.html. Online; accessed at Jun 30 2013."},{"key":"e_1_3_2_1_36_1","unstructured":"S. Inc. A Specialized Optimizer and Obfuscator for Android. http:\/\/www.saikoa.com\/dexguard. Online; accessed at Jun 30 2013.  S. Inc. A Specialized Optimizer and Obfuscator for Android. http:\/\/www.saikoa.com\/dexguard. Online; accessed at Jun 30 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288887"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"e_1_3_2_1_39_1","volume-title":"Virus Bulletin","author":"Joo S.","year":"2012","unstructured":"S. Joo and C. Hwang . Mobile Banking Vulnerability: Android Repackaging Threat . Virus Bulletin , May 2012 . S. Joo and C. Hwang. Mobile Banking Vulnerability: Android Repackaging Threat. Virus Bulletin, May 2012."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/522344.825703"},{"key":"e_1_3_2_1_41_1","volume-title":"http:\/\/proguard.sourceforge.net\/. Online","author":"Lafortune E.","year":"2013","unstructured":"E. Lafortune . ProGuard. http:\/\/proguard.sourceforge.net\/. Online ; accessed at Jun 30, 2013 . E. Lafortune. ProGuard. http:\/\/proguard.sourceforge.net\/. Online; accessed at Jun 30, 2013."},{"key":"e_1_3_2_1_42_1","volume-title":"Java Virtual Machine Specification","author":"Lindholm T.","year":"1999","unstructured":"T. Lindholm and F. Yellin . Java Virtual Machine Specification . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2 nd edition, 1999 . T. Lindholm and F. Yellin. Java Virtual Machine Specification. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2nd edition, 1999.","edition":"2"},{"key":"e_1_3_2_1_43_1","unstructured":"Lohan+. AntiLVL - Android License Verification Library Subversion. http:\/\/androidcracking.blogspot.com\/p\/antilvl_01.html. Online; accessed at Jun 30 2013.  Lohan+. AntiLVL - Android License Verification Library Subversion. http:\/\/androidcracking.blogspot.com\/p\/antilvl_01.html. Online; accessed at Jun 30 2013."},{"key":"e_1_3_2_1_44_1","unstructured":"Lohan+. Cracking Amazon DRM. http:\/\/androidcracking.blogspot.com\/2011\/04\/cracking-amazon-drm.html. Online; accessed at Jun 30 2013.  Lohan+. Cracking Amazon DRM. http:\/\/androidcracking.blogspot.com\/2011\/04\/cracking-amazon-drm.html. Online; accessed at Jun 30 2013."},{"key":"e_1_3_2_1_45_1","unstructured":"Lohan+. Cracking Verizon's V Cast Apps DRM. http:\/\/androidcracking.blogspot.com\/2011\/06\/cracking-verizons-v-cast-apps-drm.html. Online; accessed at Jun 30 2013.  Lohan+. Cracking Verizon's V Cast Apps DRM. http:\/\/androidcracking.blogspot.com\/2011\/06\/cracking-verizons-v-cast-apps-drm.html. Online; accessed at Jun 30 2013."},{"key":"e_1_3_2_1_46_1","unstructured":"S. T. Ltd. StarForce - Reliable Copy Protection for Software Content CD\/DVD\/USB. http:\/\/www.star-force.com\/.  S. T. Ltd. StarForce - Reliable Copy Protection for Software Content CD\/DVD\/USB. http:\/\/www.star-force.com\/."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.15"},{"key":"e_1_3_2_1_49_1","volume-title":"http:\/\/blogs.msdn.com\/b\/michael_howard\/archive\/2006\/05\/26\/608315.aspx. Online","author":"Address Space Layout MSDN.","year":"2013","unstructured":"MSDN. Address Space Layout Randomization for Windows Vista . http:\/\/blogs.msdn.com\/b\/michael_howard\/archive\/2006\/05\/26\/608315.aspx. Online ; accessed at Jun 24th, 2013 . MSDN. Address Space Layout Randomization for Windows Vista. http:\/\/blogs.msdn.com\/b\/michael_howard\/archive\/2006\/05\/26\/608315.aspx. Online; accessed at Jun 24th, 2013."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"key":"e_1_3_2_1_52_1","volume-title":"Amazon Provides Clarifications} Amazon App Store's DRM To Be More Restrictive Than Google's-- http:\/\/www.androidpolice.com\/2011\/03\/07\/amazon-app-stores-drm-to-be-more-restrictive-than-googles\/. Online","author":"Police A.","year":"2013","unstructured":"A. Police . {Updated : Amazon Provides Clarifications} Amazon App Store's DRM To Be More Restrictive Than Google's-- http:\/\/www.androidpolice.com\/2011\/03\/07\/amazon-app-stores-drm-to-be-more-restrictive-than-googles\/. Online ; accessed at Jun 30, 2013 . A. Police. {Updated: Amazon Provides Clarifications} Amazon App Store's DRM To Be More Restrictive Than Google's-- http:\/\/www.androidpolice.com\/2011\/03\/07\/amazon-app-stores-drm-to-be-more-restrictive-than-googles\/. Online; accessed at Jun 30, 2013."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"e_1_3_2_1_54_1","unstructured":"A. O. S. Project. Android Security Overview. http:\/\/source.android.com\/tech\/security\/index.html#memory-management-security-enhancements. Online; accessed at Jun 24th 2013.  A. O. S. Project. Android Security Overview. http:\/\/source.android.com\/tech\/security\/index.html#memory-management-security-enhancements. Online; accessed at Jun 24th 2013."},{"key":"e_1_3_2_1_55_1","volume-title":"http:\/\/code.google.com\/p\/android-apktool\/. Online","author":"Project G. C.","year":"2013","unstructured":"G. C. Project . Android-Apktool - Tool for Reengineering Android apk Files . http:\/\/code.google.com\/p\/android-apktool\/. Online ; accessed at Jun 30, 2013 . G. C. Project. Android-Apktool - Tool for Reengineering Android apk Files. http:\/\/code.google.com\/p\/android-apktool\/. Online; accessed at Jun 30, 2013."},{"key":"e_1_3_2_1_56_1","unstructured":"T. A. O. S. Project. Bytecode for the Dalvik VM. http:\/\/source.android.com\/tech\/dalvik\/dalvik-bytecode.html. Online; accessed at Jun. 23 2013.  T. A. O. S. Project. Bytecode for the Dalvik VM. http:\/\/source.android.com\/tech\/dalvik\/dalvik-bytecode.html. Online; accessed at Jun. 23 2013."},{"key":"e_1_3_2_1_57_1","first-page":"1","volume-title":"Unpacking Virtualization Obfuscators. In Proceedings of the 3rd USENIX conference on Offensive technologies, WOOT'09","author":"Rolles R.","year":"2009","unstructured":"R. Rolles . Unpacking Virtualization Obfuscators. In Proceedings of the 3rd USENIX conference on Offensive technologies, WOOT'09 , pages 1 -- 1 , Berkeley, CA, USA , 2009 . USENIX Association. R. Rolles. Unpacking Virtualization Obfuscators. In Proceedings of the 3rd USENIX conference on Offensive technologies, WOOT'09, pages 1--1, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"e_1_3_2_1_60_1","unstructured":"Slashgear. 95% Android Game Piracy Experience Highlights App Theft Challenge. http:\/\/www.slashgear.com\/95-android-game-piracy-experience-highlights-app-theft-challenge-15282064\/.  Slashgear. 95% Android Game Piracy Experience Highlights App Theft Challenge. http:\/\/www.slashgear.com\/95-android-game-piracy-experience-highlights-app-theft-challenge-15282064\/."},{"key":"e_1_3_2_1_61_1","unstructured":"A. Software. ASProtect - Software Protection Tools for Software Developers. http:\/\/www.aspack.com\/asprotect.html.  A. Software. ASProtect - Software Protection Tools for Software Developers. http:\/\/www.aspack.com\/asprotect.html."},{"key":"e_1_3_2_1_62_1","unstructured":"V. Software. VMProtect Software Protection. http:\/\/vmpsoft.com\/.  V. Software. VMProtect Software Protection. http:\/\/vmpsoft.com\/."},{"key":"e_1_3_2_1_63_1","volume-title":"http:\/\/pax.grsecurity.net\/docs\/aslr.txt. Online","author":"Team P.","year":"2013","unstructured":"P. Team . Pax Document for Linux ASLR. http:\/\/pax.grsecurity.net\/docs\/aslr.txt. Online ; accessed at Jun 24th, 2013 . P. Team. Pax Document for Linux ASLR. http:\/\/pax.grsecurity.net\/docs\/aslr.txt. Online; accessed at Jun 24th, 2013."},{"key":"e_1_3_2_1_64_1","unstructured":"A. Technologies. State of Security in the App Economy: Mobile Apps Under Attack. http:\/\/www.arxan.com\/assets\/1\/7\/state-of-security-app-economy.pdf 2012.  A. Technologies. State of Security in the App Economy: Mobile Apps Under Attack. http:\/\/www.arxan.com\/assets\/1\/7\/state-of-security-app-economy.pdf 2012."},{"key":"e_1_3_2_1_65_1","unstructured":"O. Technologies. Code Virtualizer Overview. http:\/\/www.oreans.com\/codevirtualizer.php.  O. Technologies. Code Virtualizer Overview. http:\/\/www.oreans.com\/codevirtualizer.php."},{"key":"e_1_3_2_1_66_1","first-page":"13","volume-title":"Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON '99","author":"Vall\u00e9e-Rai R.","unstructured":"R. Vall\u00e9e-Rai , P. Co , E. Gagnon , L. Hendren , P. Lam , and V. Sundaresan . Soot - a java bytecode optimization framework . In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON '99 , pages 13 --. IBM Press, 1999. R. Vall\u00e9e-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot - a java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON '99, pages 13--. IBM Press, 1999."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038698.2038704"},{"key":"e_1_3_2_1_68_1","unstructured":"WikiPedia. Frequency analysis. http:\/\/en.wikipedia.org\/wiki\/Frequency_analysis. Online; accessed at Jun 24th 2013.  WikiPedia. Frequency analysis. http:\/\/en.wikipedia.org\/wiki\/Frequency_analysis. Online; accessed at Jun 24th 2013."},{"key":"e_1_3_2_1_69_1","first-page":"29","volume-title":"Proceedings of the 21st USENIX conference on Security symposium, Security'12","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis . In Proceedings of the 21st USENIX conference on Security symposium, Security'12 , pages 29 -- 29 , Berkeley, CA, USA , 2012 . USENIX Association. L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 29--29, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"e_1_3_2_1_71_1","volume-title":"Internet Security Forum","author":"Zheng M.","year":"2012","unstructured":"M. Zheng , M. Sun , and J. Lui . Reboot the Android Third-party Markets: The Way to Defend Against Cracking and Malware Repackaging on Android Application . In Internet Security Forum , 2012 . M. Zheng, M. Sun, and J. Lui. Reboot the Android Third-party Markets: The Way to Defend Against Cracking and Malware Repackaging on Android Application. In Internet Security Forum, 2012."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets . In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12 , February 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012."}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557558"}},"subtitle":["diversifying intermediate language for anti-repackaging on android platform"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":76,"alternative-id":["10.1145\/2557547.2557558","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557558","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}