{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:20Z","timestamp":1773510920944,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Research Council (ERC)","award":["680358"],"award-info":[{"award-number":["680358"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978422","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"343-355","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["Statistical Deobfuscation of Android Applications"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Bichsel","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Veselin","family":"Raychev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Petar","family":"Tsankov","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Advertising SDK Can Be Hijacked for Making Phone Calls Geo-Locating. http:\/\/www.hotforsecurity.com\/blog\/advertising-sdk-can-be-hijacked-for-making-phone-calls-geo-locating-7461.html http:\/\/www.hotforsecurity.com\/blog\/advertising-sdk-can-be-hijacked-for-making-phone-calls-geo-locating-7461.html.  Advertising SDK Can Be Hijacked for Making Phone Calls Geo-Locating. http:\/\/www.hotforsecurity.com\/blog\/advertising-sdk-can-be-hijacked-for-making-phone-calls-geo-locating-7461.html http:\/\/www.hotforsecurity.com\/blog\/advertising-sdk-can-be-hijacked-for-making-phone-calls-geo-locating-7461.html."},{"key":"e_1_3_2_1_2_1","unstructured":"dex2jar. https:\/\/github.com\/pxb1988\/dex2jar.  dex2jar. https:\/\/github.com\/pxb1988\/dex2jar."},{"key":"e_1_3_2_1_3_1","unstructured":"F-Droid. https:\/\/f-droid.org\/.  F-Droid. https:\/\/f-droid.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Java Decompiler. http:\/\/jd.benow.ca\/.  Java Decompiler. http:\/\/jd.benow.ca\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Nice2Predict. https:\/\/github.com\/eth-srl\/Nice2Predict.  Nice2Predict. https:\/\/github.com\/eth-srl\/Nice2Predict."},{"key":"e_1_3_2_1_6_1","unstructured":"ProGuard. http:\/\/proguard.sourceforge.net\/.  ProGuard. http:\/\/proguard.sourceforge.net\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Type Erasure.https:\/\/docs.oracle.com\/javase\/tutorial\/java\/generics\/genTypes.html.  Type Erasure.https:\/\/docs.oracle.com\/javase\/tutorial\/java\/generics\/genTypes.html."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_1_10_1","volume-title":"ICML","author":"Allamanis M.","year":"2015","unstructured":"M. Allamanis , D. Tarlow , A. D. Gordon , and Y. Wei . Bimodal modelling of source code and natural language . In ICML , 2015 . M. Allamanis, D. Tarlow, A. D. Gordon, and Y. Wei. Bimodal modelling of source code and natural language. In ICML, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.27"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/850948.853439"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_1_15_1","volume-title":"OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid : An information-flow tracking system for realtime privacy monitoring on smartphones . In OSDI , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N.Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190258"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814295"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661136.2661148"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837674"},{"key":"e_1_3_2_1_20_1","volume-title":"Probabilistic Graphical Models: Principles and Techniques -Adaptive Computation and Machine Learning","author":"Koller D.","year":"2009","unstructured":"D. Koller and N. Friedman . Probabilistic Graphical Models: Principles and Techniques -Adaptive Computation and Machine Learning . The MIT Press , 2009 . D. Koller and N. Friedman. Probabilistic Graphical Models: Principles and Techniques -Adaptive Computation and Machine Learning. The MIT Press, 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"IJCAI","author":"Kremenek T.","year":"2007","unstructured":"T. Kremenek , A. Y. Ng , and D. Engler . A factor graph model for software bug finding . In IJCAI , 2007 . T. Kremenek, A. Y. Ng, and D. Engler. A factor graph model for software bug finding. In IJCAI, 2007."},{"key":"e_1_3_2_1_22_1","volume-title":"OSDI","author":"Kremenek T.","year":"2006","unstructured":"T. Kremenek , P. Twohey , G. Back , A. Ng , and D. Engler . From uncertainty to belief: Inferring the specification within . In OSDI , 2006 . T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: Inferring the specification within. In OSDI, 2006."},{"key":"e_1_3_2_1_23_1","volume-title":"ICML","author":"Lafferty J. D.","year":"2001","unstructured":"J. D. Lafferty , A. McCallum , and F. C. N. Pereira . Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data . In ICML , 2001 . J. D. Lafferty, A. McCallum, and F. C. N. Pereira. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data. In ICML, 2001."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542485"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/332084.332092"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_27_1","volume-title":"ICML","author":"Maddison C. J.","year":"2014","unstructured":"C. J. Maddison and D. Tarlow . Structured generative models of natural source code . In ICML , 2014 . C. J. Maddison and D. Tarlow. Structured generative models of natural source code. In ICML, 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837661"},{"key":"e_1_3_2_1_29_1","volume-title":"AISTATS","author":"Ratliff N. D.","year":"2007","unstructured":"N. D. Ratliff , J. A. Bagnell , and M. Zinkevich . (Approximate) Subgradient Methods for Structured Prediction . In AISTATS , 2007 . N. D. Ratliff, J. A. Bagnell, and M. Zinkevich. (Approximate) Subgradient Methods for Structured Prediction. In AISTATS, 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837671"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541814"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security","author":"Shin E. C. R.","year":"2015","unstructured":"E. C. R. Shin , D. Song , and R. Moazzezi . Recognizing functions in binaries with neural networks . In USENIX Security , 2015 . E. C. R. Shin, D. Song, and R. Moazzezi. Recognizing functions in binaries with neural networks. In USENIX Security, 2015."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000013"},{"issue":"3","key":"e_1_3_2_1_36_1","first-page":"143","article-title":"The effects of comments and identifier names on program comprehensibility: an experimental investigation","volume":"4","author":"Takang A. A.","year":"1996","unstructured":"A. A. Takang , P. A. Grubb , and R. D. Macredie . The effects of comments and identifier names on program comprehensibility: an experimental investigation . J. Prog. Lang. , 4 ( 3 ): 143 -- 167 , 1996 . A. A. Takang, P. A. Grubb, and R. D. Macredie. The effects of comments and identifier names on program comprehensibility: an experimental investigation. J. Prog. Lang., 4(3):143--167, 1996.","journal-title":"J. Prog. Lang."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_3_2_1_39_1","unstructured":"R. Yu. Ginmaster: A case study in android malware.https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical%20papers\/Yu-VB2013.pdf.  R. Yu. Ginmaster: A case study in android malware.https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical%20papers\/Yu-VB2013.pdf."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978422","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:54Z","timestamp":1750218594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":40,"alternative-id":["10.1145\/2976749.2978422","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978422","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}