{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:10:29Z","timestamp":1761581429607,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272106"],"award-info":[{"award-number":["61272106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science of Foundation of China","award":["61572349"],"award-info":[{"award-number":["61572349"]}]},{"name":"National Research Foundation, Prime Minister's Office, Singapore under its National Cybersecurity R&D Program","award":["NRF2014NCR-NCR001-30"],"award-info":[{"award-number":["NRF2014NCR-NCR001-30"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2897845.2897856","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T12:37:36Z","timestamp":1464352656000},"page":"365-376","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Mystique"],"prefix":"10.1145","author":[{"given":"Guozhu","family":"Meng","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Yinxing","family":"Xue","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Chandramohan","family":"Mahinthan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Annamalai","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Tieming","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University Of Technology, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Activity | Android Developer. http:\/\/developer.android.com\/reference\/android\/app\/Activity.html#ActivityLifecycle. Activity | Android Developer. http:\/\/developer.android.com\/reference\/android\/app\/Activity.html#ActivityLifecycle."},{"key":"e_1_3_2_1_2_1","unstructured":"GetJar Developer Zone: Publishing. http:\/\/developer.getjar.mobi\/. GetJar Developer Zone: Publishing. http:\/\/developer.getjar.mobi\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Mystique | Evolving Android Malware for Auditing Anti-Malware Tools. https:\/\/sites.google.com\/site\/malwareevolution\/. Mystique | Evolving Android Malware for Auditing Anti-Malware Tools. https:\/\/sites.google.com\/site\/malwareevolution\/."},{"key":"e_1_3_2_1_4_1","unstructured":"SlideME | Android Apps Market: Download Free & Paid Android Applications. http:\/\/slideme.org\/. SlideME | Android Apps Market: Download Free & Paid Android Applications. http:\/\/slideme.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"TorrApk - Alternative Android App Store for Free Applications. https:\/\/www.torrapk.com\/en. TorrApk - Alternative Android App Store for Free Applications. https:\/\/www.torrapk.com\/en."},{"key":"e_1_3_2_1_6_1","unstructured":"VirusShare. http:\/\/www.virusshare.com. VirusShare. http:\/\/www.virusshare.com."},{"key":"e_1_3_2_1_7_1","unstructured":"10 Years of Mobile Malware Whitepaper. http:\/\/www.fortinet.com\/sites\/default\/files\/whitepapers\/10-Years-of-Mobile-Malware-Whitepaper.pdf 2014. 10 Years of Mobile Malware Whitepaper. http:\/\/www.fortinet.com\/sites\/default\/files\/whitepapers\/10-Years-of-Mobile-Malware-Whitepaper.pdf 2014."},{"key":"e_1_3_2_1_8_1","unstructured":"VirusTotal - Free Online Virus Malware and URL Scanner. https:\/\/www.virustotal.com 2015. VirusTotal - Free Online Virus Malware and URL Scanner. https:\/\/www.virustotal.com 2015."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-16549-3_60","volume-title":"Applications of Evolutionary Computation","volume":"9028","author":"Aydogan E.","year":"2015"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9001-y"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555157"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"volume-title":"NDSS","year":"2013","author":"Chen K. Z.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","first-page":"1037","volume-title":"USENIX Security","author":"Chen Q. A.","year":"2014"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10509-8_19"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007518"},{"key":"e_1_3_2_1_24_1","unstructured":"P. Clements and L. Northrop. Software Product Lines: Practices and Patterns. Addison-Wesley Professional 3rd edition Aug. 2001. P. Clements and L. Northrop. Software Product Lines: Practices and Patterns. Addison-Wesley Professional 3rd edition Aug. 2001."},{"key":"e_1_3_2_1_25_1","first-page":"37","volume":"7459","author":"Crussell J.","year":"2012","journal-title":"In ESORICS"},{"volume-title":"Addison-Wesley","year":"2000","author":"Czarnecki K.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"OSDI","author":"Enck W.","year":"2010"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_30_1","unstructured":"Essam Al Daoud and Iqbal H. Jebril and Belal Zaqaibeh. Computer Virus Strategies and Detection Methods. 1(2) 2008. Essam Al Daoud and Iqbal H. Jebril and Belal Zaqaibeh. Computer Virus Strategies and Detection Methods. 1(2) 2008."},{"volume-title":"USENIX Security","year":"2011","author":"Felt A. P.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_33_1","unstructured":"A. P. Fuchs A. Chaudhuri and J. S. Foster. Checking Interation-Based Declassification Policies for Android Using Symbolic Execution. Technical report 2009. A. P. Fuchs A. Chaudhuri and J. S. Foster. Checking Interation-Based Declassification Policies for Android Using Symbolic Execution. Technical report 2009."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_37_1","unstructured":"H. Gunadi and A. Tiu. Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating System. CoRR abs\/1311.2362 2013. H. Gunadi and A. Tiu. Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating System. CoRR abs\/1311.2362 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714589"},{"journal-title":"Evolutionary Many-Objective Optimization: A Short Review. In CEC, pages 2419--2426","year":"2008","author":"Ishibuchi H.","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"K. C. Kang S. G. Cohen J. A. Hess W. E. Novak and A. S. Peterson. Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical report Nov 1990. K. C. Kang S. G. Cohen J. A. Hess W. E. Novak and A. S. Peterson. Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical report Nov 1990.","DOI":"10.21236\/ADA235785"},{"key":"e_1_3_2_1_41_1","unstructured":"E. Kim. Creating Better User Experiences on Google Play. http:\/\/android-developers.blogspot.ro\/2015\/03\/creating-better-user-experiences-on.html 2015. E. Kim. Creating Better User Experiences on Google Play. http:\/\/android-developers.blogspot.ro\/2015\/03\/creating-better-user-experiences-on.html 2015."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_44_1","unstructured":"H. Lockheimer. Android and Security - Official Google Mobile Blog. http:\/\/googlemobile.blogspot.sg\/2012\/02\/android-and-security.html 2012. H. Lockheimer. Android and Security - Official Google Mobile Blog. http:\/\/googlemobile.blogspot.sg\/2012\/02\/android-and-security.html 2012."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516768"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.12"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.73"},{"key":"e_1_3_2_1_49_1","first-page":"543","volume-title":"USENIX Security","author":"Octeau D.","year":"2013"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1752046.1752047"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486853"},{"volume-title":"NDSS","year":"2011","author":"Schlegel R.","key":"e_1_3_2_1_59_1"},{"volume-title":"NDSS","year":"2011","author":"Schlegel R.","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817389"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985856"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"D. J. J. T. SUFATRIO T.-W. CHUA and V. L. L. THING. Securing Android: A Survey Taxonomy and Challenges May 2015. D. J. J. T. SUFATRIO T.-W. CHUA and V. L. L. THING. Securing Android: A Survey Taxonomy and Challenges May 2015.","DOI":"10.1145\/2733306"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771808"},{"volume-title":"ICSE","year":"2014","author":"Yang W.","key":"e_1_3_2_1_65_1"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:01Z","timestamp":1750223221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897856"}},"subtitle":["Evolving Android Malware for Auditing Anti-Malware Tools"],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":67,"alternative-id":["10.1145\/2897845.2897856","10.1145\/2897845"],"URL":"https:\/\/doi.org\/10.1145\/2897845.2897856","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}