{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T20:45:52Z","timestamp":1769114752939,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,23]],"date-time":"2014-07-23T00:00:00Z","timestamp":1406073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421"],"award-info":[{"award-number":["W911NF-13-1-0421"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-09-1-0525"],"award-info":[{"award-number":["W911NF-09-1-0525"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1223710"],"award-info":[{"award-number":["CNS-1223710"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-1320605"],"award-info":[{"award-number":["CCF-1320605"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,23]]},"DOI":"10.1145\/2627393.2627395","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":121,"title":["ViewDroid"],"prefix":"10.1145","author":[{"given":"Fangfang","family":"Zhang","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Heqing","family":"Huang","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android-Apktool: A tool for reverse engineering Android apk \u00d8les. http:\/\/code.google.com\/p\/android-apktool\/.  Android-Apktool: A tool for reverse engineering Android apk \u00d8les. http:\/\/code.google.com\/p\/android-apktool\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Dexguard. http:\/\/www.saikoa.com\/dexguard.  Dexguard. http:\/\/www.saikoa.com\/dexguard."},{"key":"e_1_3_2_1_3_1","unstructured":"Intent android developers. developer.android.com\/reference\/android\/content\/Intent.html.  Intent android developers. developer.android.com\/reference\/android\/content\/Intent.html."},{"key":"e_1_3_2_1_4_1","unstructured":"KlassMaster. http:\/\/www.zelix.com\/klassmaster\/docs\/index.html.  KlassMaster. http:\/\/www.zelix.com\/klassmaster\/docs\/index.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Number of avaliable Android applications. http:\/\/www.appbrain.com\/stats\/number-of-android-apps.  Number of avaliable Android applications. http:\/\/www.appbrain.com\/stats\/number-of-android-apps."},{"key":"e_1_3_2_1_6_1","unstructured":"Proguard. http:\/\/developer.android.com\/tools\/help\/proguard.html\/.  Proguard. http:\/\/developer.android.com\/tools\/help\/proguard.html\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Security alert: New stealthy android spyware - plankton - found in official android market. http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/Plankton\/.  Security alert: New stealthy android spyware - plankton - found in official android market. http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/Plankton\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Smali: An assembler\/disassembler for Android's dex format. http:\/\/code.google.com\/p\/smali\/  Smali: An assembler\/disassembler for Android's dex format. http:\/\/code.google.com\/p\/smali\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_1_10_1","volume-title":"NDSS'13","author":"Chen K. Z.","year":"2013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219058"},{"key":"e_1_3_2_1_12_1","unstructured":"C. Collberg C. Thomborson and D. Low. A taxonomy of obfuscating transformations. Technical report 1997.  C. Collberg C. Thomborson and D. Low. A taxonomy of obfuscating transformations. Technical report 1997."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_1_16_1","volume-title":"Black hat","author":"Desnos A.","year":"2011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38908-5_13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985899"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e91-d.9.2323"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2007.7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information Security 3225\/2004 2004.  G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. Information Security 3225\/2004 2004.","DOI":"10.1007\/978-3-540-30144-8_34"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066753"},{"key":"e_1_3_2_1_26_1","volume-title":"Peachpit Press","author":"Ostrander J.","year":"2012"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321672"},{"key":"e_1_3_2_1_29_1","volume-title":"Int. Symp. on Future Software Technology","author":"Tamada H.","year":"2004"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.24"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336767"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"WiSec'14: 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"Oxford United Kingdom","acronym":"WiSec'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 2014 ACM conference on Security and privacy in wireless &amp; mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2627393.2627395","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2627393.2627395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:35Z","timestamp":1750230095000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2627393.2627395"}},"subtitle":["towards obfuscation-resilient mobile application repackaging detection"],"short-title":[],"issued":{"date-parts":[[2014,7,23]]},"references-count":35,"alternative-id":["10.1145\/2627393.2627395","10.1145\/2627393"],"URL":"https:\/\/doi.org\/10.1145\/2627393.2627395","relation":{},"subject":[],"published":{"date-parts":[[2014,7,23]]},"assertion":[{"value":"2014-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}