{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T19:02:07Z","timestamp":1769108527321,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2766508","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["DroidEagle"],"prefix":"10.1145","author":[{"given":"Mingshen","family":"Sun","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Mengmeng","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Androguard. https:\/\/code.google.com\/p\/androguard\/.  Androguard. https:\/\/code.google.com\/p\/androguard\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Android signing mechanism. http:\/\/developer.android.com\/tools\/publishing\/app-signing.html.  Android signing mechanism. http:\/\/developer.android.com\/tools\/publishing\/app-signing.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Apktool. https:\/\/code.google.com\/p\/android-apktool\/.  Apktool. https:\/\/code.google.com\/p\/android-apktool\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Axml. https:\/\/code.google.com\/p\/axml\/.  Axml. https:\/\/code.google.com\/p\/axml\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Google play bouncer. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/a-look-at-google-bouncer\/.  Google play bouncer. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/a-look-at-google-bouncer\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Smali\/baksmali. https:\/\/code.google.com\/p\/smali\/.  Smali\/baksmali. https:\/\/code.google.com\/p\/smali\/."},{"key":"e_1_3_2_1_7_1","unstructured":"ssdeep. http:\/\/ssdeep.sourceforge.net\/.  ssdeep. http:\/\/ssdeep.sourceforge.net\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Virtuous ten studio. http:\/\/virtuous-ten-studio.com\/.  Virtuous ten studio. http:\/\/virtuous-ten-studio.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"AppBrain. Number of android applications. http:\/\/www.appbrain.com\/stats\/number-of-android-apps.  AppBrain. Number of android applications. http:\/\/www.appbrain.com\/stats\/number-of-android-apps."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_1_12_1","volume-title":"Threat report h2","year":"2013","unstructured":"F-Secure. Threat report h2 2013 . http:\/\/www.f-secure.com\/static\/doc\/labs_global\/Research\/Threat_Report_H2_2013.pdf. F-Secure. Threat report h2 2013. http:\/\/www.f-secure.com\/static\/doc\/labs_global\/Research\/Threat_Report_H2_2013.pdf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.50"},{"key":"e_1_3_2_1_14_1","volume-title":"Gartner says annual smartphone sales surpassed sales of feature phones for the first time","year":"2013","unstructured":"Gartner. Gartner says annual smartphone sales surpassed sales of feature phones for the first time in 2013 . http:\/\/www.gartner.com\/newsroom\/id\/2665715. Gartner. Gartner says annual smartphone sales surpassed sales of feature phones for the first time in 2013. http:\/\/www.gartner.com\/newsroom\/id\/2665715."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_1_17_1","unstructured":"G. Inc. Google play. https:\/\/play.google.com.  G. Inc. Google play. https:\/\/play.google.com."},{"key":"e_1_3_2_1_18_1","volume-title":"Kaspersky security bulletin","year":"2013","unstructured":"Kaspersky. Kaspersky security bulletin 2013 . overall statistics for 2013. http:\/\/media.kaspersky.com\/pdf\/KSB_2013_EN.pdf. Kaspersky. Kaspersky security bulletin 2013. overall statistics for 2013. http:\/\/media.kaspersky.com\/pdf\/KSB_2013_EN.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.23"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_23_1","volume-title":"Blackhat USA 2012","author":"Strazzere T.","year":"2012","unstructured":"T. Strazzere . Dex education : Practicing safe dex . In Blackhat USA 2012 , 2012 . T. Strazzere. Dex education: Practicing safe dex. In Blackhat USA 2012, 2012."},{"key":"e_1_3_2_1_24_1","unstructured":"Umeng. 2013 umeng insight report. http:\/\/www.slideshare.net\/umengnews\/2013-umeng-insight-report.  Umeng. 2013 umeng insight report. http:\/\/www.slideshare.net\/umengnews\/2013-umeng-insight-report."},{"key":"e_1_3_2_1_25_1","unstructured":"Yourstory. Google play is not the place to be in china \"app in china\" connects you to top 20 chinese android app stores. http:\/\/yourstory.com\/2014\/02\/google-play-place-china-app-china-connects-top-20-chinese-android-app-stores\/.  Yourstory. Google play is not the place to be in china \"app in china\" connects you to top 20 chinese android app stores. http:\/\/yourstory.com\/2014\/02\/google-play-place-china-app-china-connects-top-20-chinese-android-app-stores\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Implementation and benchmarking of perceptual image hash functions. na","author":"Zauner C.","year":"2010","unstructured":"C. Zauner . Implementation and benchmarking of perceptual image hash functions. na , 2010 . C. Zauner. Implementation and benchmarking of perceptual image hash functions. na, 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218082"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557558"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"New York New York","acronym":"WiSec'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2766508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:31Z","timestamp":1750223251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766508"}},"subtitle":["seamless detection of visually similar Android apps"],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":35,"alternative-id":["10.1145\/2766498.2766508","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2766508","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}