{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:44:31Z","timestamp":1778694271264,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970277","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"756-761","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Reflection-aware static analysis of Android apps"],"prefix":"10.1145","author":[{"given":"Li","family":"Li","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Damien","family":"Octeau","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.50"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480706"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985827"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889258"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.69"},{"key":"e_1_3_2_1_9_1","first-page":"357","volume-title":"Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research","author":"Chawla Nitesh V.","year":"2002","unstructured":"Nitesh V. Chawla , Kevin W. Bowyer , Lawrence O. Hall , and W. Philip Kegelmeyer . Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research , pages 321\u2013 357 , 2002 . Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research, pages 321\u2013357, 2002."},{"key":"e_1_3_2_1_10_1","volume-title":"Jimple: Simplifying java bytecode for analyses and transformations","author":"Vallee-Rai Raja","year":"1998","unstructured":"Raja Vallee-Rai and Laurie J Hendren . Jimple: Simplifying java bytecode for analyses and transformations . 1998 . Raja Vallee-Rai and Laurie J Hendren. Jimple: Simplifying java bytecode for analyses and transformations. 1998."},{"key":"e_1_3_2_1_11_1","volume-title":"Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Yves Le Traon. Static analysis of android apps: A systematic literature review. Technical report","author":"Li Li","year":"2016","unstructured":"Li Li , Tegawend\u00e9 Fran\u00b8 cois D Assise Bissyande , Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Yves Le Traon. Static analysis of android apps: A systematic literature review. Technical report , SnT , 2016 . Li Li, Tegawend\u00e9 Fran\u00b8 cois D Assise Bissyande, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Yves Le Traon. Static analysis of android apps: A systematic literature review. Technical report, SnT, 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_3_2_1_13_1","volume-title":"Cetus Users and Compiler Infastructure Workshop (CETUS 2011)","author":"Lam Patrick","year":"2011","unstructured":"Patrick Lam , Eric Bodden , Ondrej Lhot\u00e1k , and Laurie Hendren . The soot framework for java program analysis: a retrospective . In Cetus Users and Compiler Infastructure Workshop (CETUS 2011) , 2011 . Patrick Lam, Eric Bodden, Ondrej Lhot\u00e1k, and Laurie Hendren. The soot framework for java program analysis: a retrospective. In Cetus Users and Compiler Infastructure Workshop (CETUS 2011), 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.51"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818767"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837661"},{"key":"e_1_3_2_1_19_1","first-page":"169","volume-title":"Compiler Construction","author":"Lhot\u00e1k Ond\u02c7","unstructured":"Ond\u02c7 rej Lhot\u00e1k and Laurie Hendren . Scaling java points-to analysis using spark . In Compiler Construction , pages 153\u2013 169 . Springer, 2003. Ond\u02c7 rej Lhot\u00e1k and Laurie Hendren. Scaling java points-to analysis using spark. In Compiler Construction, pages 153\u2013169. Springer, 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112328"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_23_1","volume-title":"William Enck. AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Contexts. In International Conference on Software Engineering (ICSE)","author":"Yang Wei","year":"2015","unstructured":"Wei Yang , Xusheng Xiao , Benjamin Andow , Sihan Li , Tao Xie , and William Enck. AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Contexts. In International Conference on Software Engineering (ICSE) , 2015 . Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck. AppContext: Differentiating Malicious and Benign Mobile App Behavior Under Contexts. In International Conference on Software Engineering (ICSE), 2015."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_11"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699105"},{"key":"e_1_3_2_1_27_1","first-page":"381","volume-title":"Runtime Verification","author":"Arzt Steven","unstructured":"Steven Arzt , Siegfried Rasthofer , and Eric Bodden . Instrumenting android and java applications as easy as abc . In Runtime Verification , pages 364\u2013 381 . Springer, 2013. Steven Arzt, Siegfried Rasthofer, and Eric Bodden. Instrumenting android and java applications as easy as abc. In Runtime Verification, pages 364\u2013381. Springer, 2013."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/380921.380938"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.10"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23255"},{"key":"e_1_3_2_1_31_1","unstructured":"Introduction Reflection in Android Apps DroidRA Phase 1 Phase 2 Phase 3 Summary of Evaluation Related Work Conclusion Acknowledgments References  Introduction Reflection in Android Apps DroidRA Phase 1 Phase 2 Phase 3 Summary of Evaluation Related Work Conclusion Acknowledgments References"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","location":"Singapore Singapore","acronym":"ASE'16","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970277","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":31,"alternative-id":["10.1145\/2970276.2970277","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970277","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}