{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:04Z","timestamp":1771697464135,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568301","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"1036-1046","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":144,"title":["AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction"],"prefix":"10.1145","author":[{"given":"Jianjun","family":"Huang","sequence":"first","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Contagio mobile malware mini dump. http:\/\/contagiominidump.blogspot.com\/.  Contagio mobile malware mini dump. http:\/\/contagiominidump.blogspot.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Google play market. https:\/\/play.google.com\/store\/apps\/.  Google play market. https:\/\/play.google.com\/store\/apps\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Money-stealing apps are hosting in the mobile devices. http:\/\/finance.sina.com.cn\/money\/lczx\/20120410\/0703 11783396.shtml.  Money-stealing apps are hosting in the mobile devices. http:\/\/finance.sina.com.cn\/money\/lczx\/20120410\/0703 11783396.shtml."},{"key":"e_1_3_2_1_4_1","unstructured":"Wandoujia. http:\/\/www.wandoujia.com\/apps\/.  Wandoujia. http:\/\/www.wandoujia.com\/apps\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"Aho A. V.","year":"2006","unstructured":"A. V. Aho , M. S. Lam , R. Sethi , and J. D. Ullman . Compilers: Principles, Techniques, and Tools ( 2 nd Edition). Pearson Education, Inc. , 2006 . A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools (2nd Edition). Pearson Education, Inc., 2006.","edition":"2"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Arzt K. Falzon A. Follner S. Rasthofer E. Bodden and V. Stolz. How useful are existing monitoring languages for securing Android apps? In ATPS\u201913.  S. Arzt K. Falzon A. Follner S. Rasthofer E. Bodden and V. Stolz. How useful are existing monitoring languages for securing Android apps? In ATPS\u201913."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"e_1_3_2_1_8_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"2009","unstructured":"T. H. Cormen , C. E. Leiserson , R. L. Rivest , and C. Stein . Introduction to Algorithms , Third Edition. The MIT Press , 2009 . T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms, Third Edition. The MIT Press, 2009."},{"key":"e_1_3_2_1_9_1","unstructured":"K. Elish D. D. Yao and B. G. Ryder. User-centric dependence analysis for identifying malicious mobile apps. In MoST\u201912.  K. Elish D. D. Yao and B. G. Ryder. User-centric dependence analysis for identifying malicious mobile apps. In MoST\u201912."},{"key":"e_1_3_2_1_10_1","unstructured":"W. Enck P. Gilbert B.-G. Chun L. P. Cox J. Jung P. McDaniel and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI\u201910.   W. Enck P. Gilbert B.-G. Chun L. P. Cox J. Jung P. McDaniel and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI\u201910."},{"key":"e_1_3_2_1_11_1","unstructured":"W. Enck D. Octeau P. McDaniel and S. Chaudhuri. A study of Android application security. In USENIX Security\u201911.   W. Enck D. Octeau P. McDaniel and S. Chaudhuri. A study of Android application security. In USENIX Security\u201911."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_13_1","volume-title":"TU Darmstadt","author":"Fritz C.","year":"2013","unstructured":"C. Fritz , S. Arzt , S. Rasthofer , E. Bodden , A. Bartel , J. Klein , Y. le Traon , D. Octeau , and P. McDaniel . Highly precise taint analysis for Android applications. Technical report , TU Darmstadt , 2013 . C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. Highly precise taint analysis for Android applications. Technical report, TU Darmstadt, 2013."},{"key":"e_1_3_2_1_14_1","unstructured":"Gartner. Gartner says worldwide sales of mobile phones declined 3 percent in third quarter of 2012; smartphone sales increased 47 percent. http:\/\/www.gartner.com\/it\/page.jsp?id=2237315.  Gartner. Gartner says worldwide sales of mobile phones declined 3 percent in third quarter of 2012; smartphone sales increased 47 percent. http:\/\/www.gartner.com\/it\/page.jsp?id=2237315."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999732.1999740"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. Android 4.2 compatibility definition. http:\/\/source.android.com\/compatibility\/4.2\/android- 4.2-cdd.pdf.  Google. Android 4.2 compatibility definition. http:\/\/source.android.com\/compatibility\/4.2\/android- 4.2-cdd.pdf."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. Android developer guide. http:\/\/developer.android.com\/guide\/.  Google. Android developer guide. http:\/\/developer.android.com\/guide\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(05)00214-X"},{"key":"e_1_3_2_1_20_1","unstructured":"F. Gross G. Fraser and A. Zeller. EXSYST: search-based GUI testing. In ICSE\u201912.   F. Gross G. Fraser and A. Zeller. EXSYST: search-based GUI testing. In ICSE\u201912."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_22_1","unstructured":"IBM T.J. Watson Research Center. T.J. Watson Libraries for Analysis (WALA). http:\/\/wala.sourceforge.net\/.  IBM T.J. Watson Research Center. T.J. Watson Libraries for Analysis (WALA). http:\/\/wala.sourceforge.net\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Juniper Networks. Juniper mobile security report 2011 - unprecedented mobile threat growth. http:\/\/forums.juniper.net\/t5\/Security-Mobility-Now\/ Juniper-Mobile-Security-Report-2011-Unprecedented-Mobile-Threat\/ba-p\/129529.  Juniper Networks. Juniper mobile security report 2011 - unprecedented mobile threat growth. http:\/\/forums.juniper.net\/t5\/Security-Mobility-Now\/ Juniper-Mobile-Security-Report-2011-Unprecedented-Mobile-Threat\/ba-p\/129529."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3115\/1075096.1075152"},{"key":"e_1_3_2_1_26_1","volume-title":"IT threat evolution: Q1","author":"Maslennikov D.","year":"2013","unstructured":"D. Maslennikov . IT threat evolution: Q1 2013 . http:\/\/www.securelist.com\/en\/analysis\/204792292\/. D. Maslennikov. IT threat evolution: Q1 2013. http:\/\/www.securelist.com\/en\/analysis\/204792292\/."},{"key":"e_1_3_2_1_27_1","unstructured":"N. Mirzaei S. Malek and R. M. Corina S. P\u0103s\u0103reanu Naeem Esfahani. Testing Android apps through symbolic execution. In JPF\u201912.  N. Mirzaei S. Malek and R. M. Corina S. P\u0103s\u0103reanu Naeem Esfahani. Testing Android apps through symbolic execution. In JPF\u201912."},{"key":"e_1_3_2_1_28_1","unstructured":"National Taiwan University. Chinese wordnet. http:\/\/lope.linguistics.ntu.edu.tw\/cwm\/.  National Taiwan University. Chinese wordnet. http:\/\/lope.linguistics.ntu.edu.tw\/cwm\/."},{"key":"e_1_3_2_1_29_1","unstructured":"D. Octeau P. McDaniel S. Jha A. Bartel E. Bodden J. Klein and Y. L. Traon. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysi. In USENIX Security\u201913.   D. Octeau P. McDaniel S. Jha A. Bartel E. Bodden J. Klein and Y. L. Traon. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysi. In USENIX Security\u201913."},{"key":"e_1_3_2_1_30_1","unstructured":"R. Pandita X. Xiao W. Yang W. Enck and T. Xie. WHYPER: Towards automating risk assessment of mobile applications. In USENIX Security\u201913.   R. Pandita X. Xiao W. Yang W. Enck and T. Xie. WHYPER: Towards automating risk assessment of mobile applications. In USENIX Security\u201913."},{"key":"e_1_3_2_1_31_1","unstructured":"pxb1988. dex2jar: Tools to work with android .dex and java .class files. http:\/\/code.google.com\/p\/dex2jar\/.  pxb1988. dex2jar: Tools to work with android .dex and java .class files. http:\/\/code.google.com\/p\/dex2jar\/."},{"key":"e_1_3_2_1_32_1","unstructured":"TrendLabs. 3Q 2012 security roundup - Android under siege: Popularity comes at a price. http:\/\/www.trendmicro.com\/us\/security-intelligence\/.  TrendLabs. 3Q 2012 security roundup - Android under siege: Popularity comes at a price. http:\/\/www.trendmicro.com\/us\/security-intelligence\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336782"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_35_1","unstructured":"Y. Zhou Z. Wang W. Zhou and X. Jiang. Hey you get off of my market: Detecting malicious apps in o\ufb03cial and alternative Android markets. In NDSS\u201912.  Y. Zhou Z. Wang W. Zhou and X. Jiang. Hey you get off of my market: Detecting malicious apps in o\ufb03cial and alternative Android markets. In NDSS\u201912."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:37Z","timestamp":1750230097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":34,"alternative-id":["10.1145\/2568225.2568301","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568301","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}