{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:22:41Z","timestamp":1764174161211,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,2]],"date-time":"2015-03-02T00:00:00Z","timestamp":1425254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,2]]},"DOI":"10.1145\/2699026.2699105","type":"proceedings-article","created":{"date-parts":[[2015,2,23]],"date-time":"2015-02-23T16:02:15Z","timestamp":1424707335000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["StaDynA"],"prefix":"10.1145","author":[{"given":"Yury","family":"Zhauniarovich","sequence":"first","affiliation":[{"name":"University of Trento, Trento, Italy"}]},{"given":"Maqsood","family":"Ahmad","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, Italy"}]},{"given":"Olga","family":"Gadyatskaya","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"University of Trento; DistriNet, KU Leuven, Trento, Italy"}]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,3,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AndroGuard: Reverse engineering malware and goodware analysis of Android applications. Available Online. https:\/\/code.google.com\/p\/androguard\/.  AndroGuard: Reverse engineering malware and goodware analysis of Android applications. Available Online. https:\/\/code.google.com\/p\/androguard\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Android - App Manifest - Permission http:\/\/developer.android.com\/guide\/topics\/manifest\/permission-element.html.  Android - App Manifest - Permission http:\/\/developer.android.com\/guide\/topics\/manifest\/permission-element.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Android Security Tips. Available Online. http:\/\/developer.android.com\/training\/articles\/security-tips.html.  Android Security Tips. Available Online. http:\/\/developer.android.com\/training\/articles\/security-tips.html."},{"key":"e_1_3_2_1_4_1","unstructured":"AndroidBest -- Android market. http:\/\/androidbest.ru\/.  AndroidBest -- Android market. http:\/\/androidbest.ru\/."},{"key":"e_1_3_2_1_5_1","unstructured":"AndroidDrawer -- Android market. http:\/\/www.androiddrawer.com\/.  AndroidDrawer -- Android market. http:\/\/www.androiddrawer.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"AndroidLife -- Android market. http:\/\/androidlife.ru\/.  AndroidLife -- Android market. http:\/\/androidlife.ru\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Anruan -- Android market. http:\/\/www.anruan.com\/.  Anruan -- Android market. http:\/\/www.anruan.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"AppsApk -- Android market. http:\/\/www.appsapk.com\/.  AppsApk -- Android market. http:\/\/www.appsapk.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"F-Droid -- Android market. https:\/\/f-droid.org\/.  F-Droid -- Android market. https:\/\/f-droid.org\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Google Play -- Android official market. https:\/\/play.google.com\/store\/apps.  Google Play -- Android official market. https:\/\/play.google.com\/store\/apps."},{"key":"e_1_3_2_1_11_1","unstructured":"UI\/Application Exerciser Monkey. Available Online. http:\/\/developer.android.com\/tools\/help\/monkey.html.  UI\/Application Exerciser Monkey. Available Online. http:\/\/developer.android.com\/tools\/help\/monkey.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351722"},{"key":"e_1_3_2_1_15_1","first-page":"1021","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Bhoraskar R.","year":"2014","unstructured":"R. Bhoraskar , S. Han , J. Jeon , T. Azim , S. Chen , J. Jung , S. Nath , R. Wang , and D. Wetherall . Brahmastra: Driving Apps to Test the Security of Third-Party Components . In 23rd USENIX Security Symposium (USENIX Security 14) , pages 1021 -- 1036 , August 2014 . R. Bhoraskar, S. Han, J. Jeon, T. Azim, S. Chen, J. Jung, S. Nath, R. Wang, and D. Wetherall. Brahmastra: Driving Apps to Test the Security of Third-Party Components. In 23rd USENIX Security Symposium (USENIX Security 14), pages 1021--1036, August 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/166848.166854"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985827"},{"key":"e_1_3_2_1_18_1","first-page":"2","volume-title":"Proceedings of the 2001 Symposium on\\ JavaTM Virtual Machine Research and Technology Symposium -","volume":"1","author":"Bogda J.","year":"2001","unstructured":"J. Bogda and A. Singh . Can a Shape Analysis Work at Run-time? In Proceedings of the 2001 Symposium on\\ JavaTM Virtual Machine Research and Technology Symposium - Volume 1 , pages 2 -- 2 , 2001 . J. Bogda and A. Singh. Can a Shape Analysis Work at Run-time? In Proceedings of the 2001 Symposium on\\ JavaTM Virtual Machine Research and Technology Symposium - Volume 1, pages 2--2, 2001."},{"key":"e_1_3_2_1_19_1","unstructured":"F. Chung. Custom Class Loading in Dalvik. Available Online. http:\/\/android-developers.blogspot.it\/2011\/07\/custom-class-loading-in-dalvik.html.  F. Chung. Custom Class Loading in Dalvik. Available Online. http:\/\/android-developers.blogspot.it\/2011\/07\/custom-class-loading-in-dalvik.html."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2204249"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation , pages 1 -- 6 , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pages 1--6, 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_24_1","unstructured":"F-Secure. Trojan:Android\/FakeNotify Gets Updated. Available Online Dec. 2011. http:\/\/www.f-secure.com\/weblog\/archives\/00002291.html?tduid=f57e2769518f081721ffca586e797b2a.  F-Secure. Trojan:Android\/FakeNotify Gets Updated. Available Online Dec. 2011. http:\/\/www.f-secure.com\/weblog\/archives\/00002291.html?tduid=f57e2769518f081721ffca586e797b2a."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2259818"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216374.1216379"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480706"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/286936.286945"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns forSecurity (BADGERS)","author":"Lindorfer M.","year":"2014","unstructured":"M. Lindorfer , M. Neugschwandtner , L. Weichselbaum , Y. Fratantonio , V. van der Veen, and C. Platzer. Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors . In Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns forSecurity (BADGERS) , 2014 . M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, and C. Platzer. Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. In Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns forSecurity (BADGERS), 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_11"},{"volume-title":"Available Online","year":"2014","key":"e_1_3_2_1_37_1","unstructured":"Pandalabs. New Malware Attack through Google Play . Available Online , Feb. 2014 .http:\/\/pandalabs.pandasecurity.com\/new-malware-attack-through-google-play\/. Pandalabs. New Malware Attack through Google Play. Available Online, Feb. 2014.http:\/\/pandalabs.pandasecurity.com\/new-malware-attack-through-google-play\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_41_1","unstructured":"D. Sosnoski. Java programming dynamics Part 1: Java classes and class loading. Available Online. http:\/\/www.ibm.com\/developerworks\/library\/j-dyn0429\/.  D. Sosnoski. Java programming dynamics Part 1: Java classes and class loading. Available Online. http:\/\/www.ibm.com\/developerworks\/library\/j-dyn0429\/."},{"key":"e_1_3_2_1_42_1","volume-title":"Automated Detection of SSL\/TLS Man-in-the-Middle Vulnerabilities in Android Apps. In Proceedings of the 21st Annual Network and Distributed System Security Symposium","author":"Sounthiraraj D.","year":"2014","unstructured":"D. Sounthiraraj , J. Sahs , G. Greenwood , Z. Lin , and L. Khan . SMV-Hunter: Large Scale , Automated Detection of SSL\/TLS Man-in-the-Middle Vulnerabilities in Android Apps. In Proceedings of the 21st Annual Network and Distributed System Security Symposium , San Diego, CA , February 2014 . D. Sounthiraraj, J. Sahs, G. Greenwood, Z. Lin, and L. Khan. SMV-Hunter: Large Scale, Automated Detection of SSL\/TLS Man-in-the-Middle Vulnerabilities in Android Apps. In Proceedings of the 21st Annual Network and Distributed System Security Symposium, San Diego, CA, February 2014."},{"key":"e_1_3_2_1_43_1","first-page":"559","volume-title":"Proceedings of the 22nd USENIX Conference on Security","author":"Wang T.","year":"2013","unstructured":"T. Wang , K. Lu , L. Lu , S. Chung , and W. Lee . Jekyll on iOS: When Benign Apps Become Evil . In Proceedings of the 22nd USENIX Conference on Security , pages 559 -- 572 , 2013 . T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on iOS: When Benign Apps Become Evil. In Proceedings of the 22nd USENIX Conference on Security, pages 559--572, 2013."},{"key":"e_1_3_2_1_44_1","volume-title":"Static Analysis of Dalvik Bytecode and Reflection in Android. Master's thesis","author":"Wognsen E. R.","year":"2012","unstructured":"E. R. Wognsen and H. S. Karlsen . Static Analysis of Dalvik Bytecode and Reflection in Android. Master's thesis , Aalborg University , 2012 . E. R. Wognsen and H. S. Karlsen. Static Analysis of Dalvik Bytecode and Reflection in Android. Master's thesis, Aalborg University, 2012."},{"key":"e_1_3_2_1_45_1","first-page":"29","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis . In Proceedings of the 21st USENIX Conference on Security Symposium , pages 29 -- 29 , 2012 . L. K. Yan and H. Yin. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Proceedings of the 21st USENIX Conference on Security Symposium, pages 29--29, 2012."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512496"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2300482"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484359"},{"key":"e_1_3_2_1_50_1","volume-title":"Available Online","author":"Zhou Y.","year":"2011","unstructured":"Y. Zhou and X. Jiang . An Analysis of the AnserverBot Trojan . Available Online , September 2011 . http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/ pubs\/AnserverBot_Analysis.pdf. Y. Zhou and X. Jiang. An Analysis of the AnserverBot Trojan. Available Online, September 2011. http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/ pubs\/AnserverBot_Analysis.pdf."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CODASPY'15: Fifth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'15"},"container-title":["Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2699026.2699105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2699026.2699105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:36Z","timestamp":1750227216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2699026.2699105"}},"subtitle":["Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications"],"short-title":[],"issued":{"date-parts":[[2015,3,2]]},"references-count":51,"alternative-id":["10.1145\/2699026.2699105","10.1145\/2699026"],"URL":"https:\/\/doi.org\/10.1145\/2699026.2699105","relation":{},"subject":[],"published":{"date-parts":[[2015,3,2]]},"assertion":[{"value":"2015-03-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}