{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:42:18Z","timestamp":1762033338434,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T00:00:00Z","timestamp":1457481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Sardinia Regional Government","award":["P.O.R. Sardegna F.S.E. - European Social Fund 2007-2013"],"award-info":[{"award-number":["P.O.R. Sardegna F.S.E. - European Social Fund 2007-2013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,9]]},"DOI":"10.1145\/2857705.2857737","type":"proceedings-article","created":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T20:57:50Z","timestamp":1457125070000},"page":"139-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Evaluating Analysis Tools for Android Apps"],"prefix":"10.1145","author":[{"given":"Johannes","family":"Hoffmann","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Teemu","family":"Rytilahti","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Davide","family":"Maiorca","sequence":"additional","affiliation":[{"name":"University of Cagliari, Cagliari , Italy"}]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[{"name":"University of Caliari, Caliari, Italy"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,3,9]]},"reference":[{"unstructured":"Anubis -- Malware Analysis for Unknown Binaries. https:\/\/anubis.iseclab.org\/.  Anubis -- Malware Analysis for Unknown Binaries. https:\/\/anubis.iseclab.org\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"DroidBox. http:\/\/code.google.com\/p\/droidbox\/.  DroidBox. http:\/\/code.google.com\/p\/droidbox\/.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.14722\/ndss.2015.23140"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2185448.2185466"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of Black Hat Abu Dhabi","author":"Desnos A.","year":"2011","unstructured":"A. Desnos and G. Gueguen . Android: From reversing to decompilation . In Proc. of Black Hat Abu Dhabi , 2011 . A. Desnos and G. Gueguen. Android: From reversing to decompilation. In Proc. of Black Hat Abu Dhabi, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. Sheth . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In OSDI. USENIX Association , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI. USENIX Association, 2010."},{"unstructured":"ForeSafe. ForeSafe Online Scanner. http:\/\/www.foresafe.com\/scan.  ForeSafe. ForeSafe Online Scanner. http:\/\/www.foresafe.com\/scan.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2480362.2480706"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2614628.2614633"},{"unstructured":"NVISO. NVISO ApkScan -- Scan Android applications for malware. http:\/\/apkscan.nviso.be\/.  NVISO. NVISO ApkScan -- Scan Android applications for malware. http:\/\/apkscan.nviso.be\/.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Effective Inter-component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In USENIX Security Symposium","author":"Octeau D.","year":"2013","unstructured":"D. Octeau , P. McDaniel , S. Jha , A. Bartel , E. Bodden , J. Klein , and Y. Le Traon . Effective Inter-component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In USENIX Security Symposium , 2013 . D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon. Effective Inter-component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In USENIX Security Symposium, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2480362.2480701"},{"unstructured":"V. van der Veen and C. Rossow. Tracedroid. http:\/\/tracedroid.few.vu.nl.  V. van der Veen and C. Rossow. Tracedroid. http:\/\/tracedroid.few.vu.nl.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2660267.2660357"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2699026.2699105"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY'16","name":"CODASPY'16: Sixth ACM Conference on Data and Application Security and Privacy","location":"New Orleans Louisiana USA"},"container-title":["Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857705.2857737","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2857705.2857737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:42Z","timestamp":1750227162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857705.2857737"}},"subtitle":["Status Quo and Robustness Against Obfuscation"],"short-title":[],"issued":{"date-parts":[[2016,3,9]]},"references-count":16,"alternative-id":["10.1145\/2857705.2857737","10.1145\/2857705"],"URL":"https:\/\/doi.org\/10.1145\/2857705.2857737","relation":{},"subject":[],"published":{"date-parts":[[2016,3,9]]},"assertion":[{"value":"2016-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}