{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:42:48Z","timestamp":1772041368958,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T00:00:00Z","timestamp":1444348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science, ICT & Future Planning","award":["2011-0029923"],"award-info":[{"award-number":["2011-0029923"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,9]]},"DOI":"10.1145\/2811411.2811545","type":"proceedings-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T04:22:54Z","timestamp":1446006174000},"page":"314-318","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Structural information based malicious app similarity calculation and clustering"],"prefix":"10.1145","author":[{"given":"Junhyoung","family":"Kim","sequence":"first","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]},{"given":"Tae Guen","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"at Least 34% of Android Malware Is Stealing Your Data","author":"Number","year":"2011","unstructured":"Number of the Week : at Least 34% of Android Malware Is Stealing Your Data . 2011 . http:\/\/www.kaspersky.com\/about\/news\/virus\/2011\/Number_of_the_Week_at_Least_34_of_Android_Malware_Is_Stealing_Your_Data. Number of the Week: at Least 34% of Android Malware Is Stealing Your Data. 2011. http:\/\/www.kaspersky.com\/about\/news\/virus\/2011\/Number_of_the_Week_at_Least_34_of_Android_Malware_Is_Stealing_Your_Data."},{"key":"e_1_3_2_1_2_1","unstructured":"Malicious Mobile Threats Report 2010\/2011. http:\/\/www.juniper.net\/us\/en\/company\/press-center\/press--releases\/2011\/pr_2011_05_10-09_00.html.  Malicious Mobile Threats Report 2010\/2011. http:\/\/www.juniper.net\/us\/en\/company\/press-center\/press--releases\/2011\/pr_2011_05_10-09_00.html."},{"key":"e_1_3_2_1_3_1","volume-title":"UAE","author":"Desnos","year":"2011","unstructured":"Desnos , Anthony, and Geoffroy Gueguen . 2011 . Android: From reversing to decompilation. In Proceeding of Black Hat (Abu Dhabi , UAE , Dec 14-15, 2011), 77--101. Desnos, Anthony, and Geoffroy Gueguen. 2011. Android: From reversing to decompilation. In Proceeding of Black Hat (Abu Dhabi, UAE, Dec 14-15, 2011), 77--101."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/974043.974067"},{"key":"e_1_3_2_1_5_1","unstructured":"Androguard : http:\/\/code.google.com\/p\/androguard  Androguard : http:\/\/code.google.com\/p\/androguard"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982509"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of Detection of Intrusions and Malware & Vulnerability Assessment","author":"Flake H.","year":"2004","unstructured":"Flake , H. 2004 . Structural comparison of executable objects . In Proceedings of Detection of Intrusions and Malware & Vulnerability Assessment ( Dortmund, Germany , July 6-7, 2004). 161--174. Flake, H. 2004. Structural comparison of executable objects. In Proceedings of Detection of Intrusions and Malware & Vulnerability Assessment (Dortmund, Germany, July 6-7, 2004). 161--174."},{"key":"e_1_3_2_1_10_1","volume-title":"Symposium sur la S\u00e9curit\u00e9 des Technologiesde l'Information et des Communications, 5","author":"Dullien R.","year":"2005","unstructured":"T. Dullien and R. Rolles . 2005. Graph-based comparison of Executable Objects . In Symposium sur la S\u00e9curit\u00e9 des Technologiesde l'Information et des Communications, 5 ( Rennes, France , June 1-3, 2005 ). 1--3. T. Dullien and R. Rolles. 2005. Graph-based comparison of Executable Objects. In Symposium sur la S\u00e9curit\u00e9 des Technologiesde l'Information et des Communications, 5 (Rennes, France, June 1-3, 2005). 1--3."},{"key":"e_1_3_2_1_11_1","unstructured":"VirusShare : http:\/\/virusshare.com\/  VirusShare : http:\/\/virusshare.com\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.44024"},{"key":"e_1_3_2_1_14_1","unstructured":"Karspersky : http:\/\/usa.kaspersky.com\/  Karspersky : http:\/\/usa.kaspersky.com\/"},{"key":"e_1_3_2_1_15_1","unstructured":"VirusTotal : http:\/\/www.virustotal.com  VirusTotal : http:\/\/www.virustotal.com"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513300"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Malware. (Oct. 7-8, 2008","author":"Tian L. M.","year":"2008","unstructured":"R. Tian , L. M. Batten and S. C. Versteeg . 2008. Function Length as a Tool for Malware Classification , In Proceedings of the Malware. (Oct. 7-8, 2008 ), 69--76. DOI= http:\/\/dx.doi.org\/10.1109\/MALWARE. 2008 .4690860. 10.1109\/MALWARE.2008.4690860 R. Tian, L. M. Batten and S. C. Versteeg. 2008. Function Length as a Tool for Malware Classification, In Proceedings of the Malware. (Oct. 7-8, 2008), 69--76. DOI= http:\/\/dx.doi.org\/10.1109\/MALWARE.2008.4690860."}],"event":{"name":"RACS '15: International Conference on Research in Adaptive and Convergent Systems","location":"Prague Czech Republic","acronym":"RACS '15","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"]},"container-title":["Proceedings of the 2015 Conference on research in adaptive and convergent systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2811411.2811545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:50Z","timestamp":1750225730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,9]]},"references-count":17,"alternative-id":["10.1145\/2811411.2811545","10.1145\/2811411"],"URL":"https:\/\/doi.org\/10.1145\/2811411.2811545","relation":{},"subject":[],"published":{"date-parts":[[2015,10,9]]},"assertion":[{"value":"2015-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}